Shaarli export of all bookmarks on Tue, 28 May 19 08:07:17 -0400
- Why local governments are a hot target for cyberattacks | CSO Online
- ESP8266 Upgrade Gives IKEA LEDs UDP Superpowers | Hackaday
- Auction for a laptop full of malware closes at $1.2 million
- A threat actor scans Windows systems for BlueKeep vulnerability | Born's Tech and Windows World
- SignalsEverywhere: ADS-B Aircraft Tracking with RTL-SDR, dump1090 and Virtual Radar Server
- Short Article Explaining DSP Basics Without Math
- Assessing your disk performance and your needs: Choosing your Azure storage disks (Part 3) – Dynamics AX in the Field
- Walmart's New Way To Cut Health Costs: Better Medical Imaging For Workers : Shots - Health News : NPR
- Accountability vs. responsibility | Seth's Blog
- PerfView Hard Core CPU Investigations (Using CPU Counters) on Windows 10 – Vance Morrison's Weblog
- Office 2016 vs. Office 365: Differences and Licensing | Windows OS Hub
- Pragmatic Debian packaging (2019) | Vincent Bernat
- Microsoft 365 Licensing Diagrams | Alexander's Blog
- Intel Loses 5X More Average Performance Than AMD From Mitigations: Report
- UPenn Medicine's AI tool for data analytics is open-source, free to the public
- OpenJDK 8 and 11: Still in safe hands - Red Hat Developer Blog
- Health Port: Creates Solution for Open Source Electronic Health Records
- Bluetooth's Complexity Has Become a Security Risk | WIRED
- WannaCry? Hundreds of US schools still haven’t patched servers [Updated] | Ars Technica
- How To Enable Or Disable SSH Access For A Particular User Or Group In Linux? | 2daygeek.com
- Moody's downgrades Equifax outlook to negative, cites cybersecurity
- Lack of Secure Coding Called a National Security Threat
- After 2 Years, WannaCry Remains a Threat - BankInfoSecurity
- Here's all the important stuff Google announced at I/O 2019
- MIT AI model is 'significantly' better at predicting breast cancer
- Super Micro will move chip production out of China to avoid spying claims
- A ransomware attack is holding Baltimore's networks hostage
- A parent's guide to raising a good digital citizen
- Hacker Summer Camp 2019 Preview · System Overlord
- Windows Incident Response: Lessons From Time In The Industry
- Geometry in Image Forensics – We are OSINTCurio.us
- Basics of Breach Data – We are OSINTCurio.us
- Security of Connected Vehicles - Part IRafeeq Rehman – Personal Blog
- Mod Security Web Application Firewall
- Scottish Government Security Basics
- Cyber Essentials
- Continuous Integration. Continuous Delivery. Continuous Security? - via @codeship | via @codeship
- Ubiquiti Networks - Training Courses
- Healthcare Exchange Standards: FHIR Security & Privacy activities
- Singapore eHealth - Innovative Technologies and Security ~ Cyber Thoughts
- Introduction to analysing full disk encryption solutions | DiabloHorn
- Sunlight for the Ransomware Data Recovery Industry
- Sodinokibi Ransomware Poised to Impact Larger Enterprises
- DHS-CERT Alert 10KBLAZE | Onapsis
- Beyond wealth: What happens AFTER you reach financial independence?
- An introduction to square-foot gardening
- Episode 19: Democratizing Cybersecurity | Linux Journal
- Blindered by the GDPR | Linux Journal
- All About ITIL Levels and Their Badges – Running Your Business
- Kubernetes security: 4 strategic tips | The Enterprisers Project
- WebAuthn Web Authentication with YubiKey 5 | Linux Journal
- Java mon amour: good old friend JMeter
- Vulnerability Management vendors and Vulnerability Remediation problems | Alexander V. Leonov
- Code IB 2019: Vulnerability Management Masterclass | Alexander V. Leonov
- First American security flaw leaked 885 million real estate documents
- Ransomware attacks in US cities are using a stolen NSA tool
- What Is UFS 3.0? — The Powerful Successor To microSD Memory Card
- Here Are The Companies Who Have Banned Huawei
- Huawei Cannot Use microSD Cards In Its Future Devices
- How to Weaponize the Yubikey - Black Hills Information Security
- Portable Retro Game Console with 7.9-inch display | Hackaday.io
- Sound Card ADCs For Electrocardiograms | Hackaday
- A Farmer’s Guide to Technology | Hackaday
- Faxsploit – Exploiting A Fax With A Picture | Hackaday
- What Happened With Supermicro? | Hackaday
- Picking the Right Sensors for Home Automation | Hackaday
- Making a Dash Button Update Your To-do List | Hackaday
- Forget Artificial Intelligence; Think Artificial Life | Hackaday
- Shadowhammer, WPA3, and Alexa is Listening: This Week in Computer Security | Hackaday
- Windows Utility Helps ID Serial Ports | Hackaday
- Building A Windows 10 1903 (May 2019 Update) Reference Image with MDT – Stick To The Script
- Deploying A Windows 10 1903 (May 2019 Update) Reference Image with MDT – Stick To The Script
- Configuring Oracle DB data source in JBoss EAP 7.1 - Blog dbi services
- Documentum - Delete Remote Docbase - Strange behavior - Blog dbi services
- The Smart Conference Badge We Almost Failed Shipping
- Everything We Know About SpaceX’s Starlink Network | Hackaday
- By The Numbers: Which Rapper’s Rhymes Are The Freshest? | Hackaday
- Protecting Information Assets and IT Infrastructure in the Cloud | Data Protection: Avamar, NetWorker, Data Domain, RecoverPoint, CSM
- US companies waste over two months a year resetting passwords
- .NET Framework is dead -- long live .NET 5
- Lack of security and operations basics leave businesses unprepared for breaches
- Three options companies should consider for backup & storage in 2019
- Reported data breaches up more than 56 percent
- Americans are overconfident about cybersecurity
- New privacy regulations mean your company needs better data management now
- 46 percent of organizations consider taking personal data out of the cloud
- New tool helps protect sensitive data on Oracle databases
- Half of companies missed GDPR compliance deadline
- Media server Serviio 2.0 adds multi-user streaming
- The changing landscape of cybersecurity
- Should I build a new media PC?
- Windows 10 V1903: Security Baseline final released | Born's Tech and Windows World
- David A. Wheeler's Blog
- GDPR one year on -- what have we learned and what happens next?
- 72 percent of cyber security professionals have considered quitting over lack of resources
- Cable Management Tips for Building Your New PC Like a Pro
- The 12 Best Search Engines to Explore the Invisible Web
- How to Install Windows 10 From a Bootable USB Drive
- Providing Healthcare Information Services in Small and Rural Libraries » Public Libraries Online
- The Illusion of "Doing Many Things" - briancasel.com
- If You Worry About 768K Day, You’re Probably Doing Something Wrong « ipSpace.net blog
- Ubiquitous VMware | Architecting IT
- Quick post: DISM and Features on Demand (FOD) | >_
- Talking to college students about information security · major.io
- Video: Finding Performance Bottlenecks of Windows Based Systems with PowerShell – Mike F Robbins
- Newbie Guide to Systems Engineering — ThinkCharles.net
- New – Opt-in to Default Encryption for New EBS Volumes | AWS News Blog
- Master VMware logging with these tools and strategies
- The problem with Googling for solutions | The ORACLE-BASE Blog
- Dissecting 190416 BP, PSU, RU and RUR - DBA - Rodrigo Jorge - Oracle Tips and Guides
- Re-partitioning | Oracle Scratchpad
- Storage Executive Software
- Some Thoughts on Program-Level College Scorecard Data – Robert Kelchen
- Digital Forensics vs. Computer Forensics - Data Narro, LLC
- SQL Injection Protection - Data Security and Privacy - Thomas LaRock
- Examples of using Machine Learning on Video and Photo in Public « Oralytics
- Oracle ACE Program : How you "align" matters! | The ORACLE-BASE Blog
- The Hidden Gem that is StorPool | Architecting IT
- Some Btrfs vs Ext4 random-read/write performance observations | Ctrl blog
- BlueKeep: Windows Remote Desktop Services vulnerability exploits status | Born's Tech and Windows World
- Microsoft Azure Networking Slide Deck Is Ready « ipSpace.net blog
- Measuring Linux IO read/write mix and size – The ongoing struggle
- Connecting Go Lang to Oracle Database « Oralytics
- Which JDK should I use now?
- Java 8 vs Java 11 - What are the Key Changes?
- 5 of the Best LaTex Editors for Linux - Make Tech Easier
- DevOps salaries: 10 statistics to see | The Enterprisers Project
- Open source thermostat runs openHAB on a Raspberry Pi Zero W
- Good News! Indian State Saves $428 Million by Choosing Linux
- CGroup Interactions | Linux Journal
- GitHub - arendst/Sonoff-Tasmota: Provide ESP8266 based itead Sonoff with Web, MQTT and OTA firmware using Arduino IDE or PlatformIO
- Red Hat enables Lockheed Martin to deliver F-22 Raptor upgrades - Help Net Security
- 5 Open Source Wi-Fi Hotspot Solutions - DD-WRT, CoovaAP - Reports - LinuxPlanet - Linux Today Blog
- PiShrink - Make Raspberry Pi Images Smaller - OSTechNix
- How to Encrypt Linux Partitions with VeraCrypt on Ubuntu
- Data in a Flash, Part II: Using NVMe Drives and Creating an NVMe over Fabrics Network | Linux Journal
- DLNA server with MiniDLNA under Linux / Raspberry Pi – Unixblogger
- Kubernetes - Role Based Access - The IT Hollow
- 88 Important Truths I’ve Learned About Life
- How to Get Longer Life Out of Your Dell Laptop Battery | b3n.org
- Activist hacking declined 95 percent since 2015
- Activist hacking declined 95 percent since 2015
- Career advice I wish I'd been given when I was young - 80,000 Hours
- The State of IT Transformation: Legacy Infrastructure Jeopardizes Transformation Initiatives | APMdigest - Application Performance Management
- Chris's Wiki :: blog/solaris/OmniOSNo10GCost
- Chris's Wiki :: blog/sysadmin/InspectingTLSWithCertigo
- Chris's Wiki :: blog/unix/XtermKeybinding
- Blockchain for Impact: Blockchain Revolution Global Event Wrap-Up | Beth's Blog
- Application-Focused Backups | Architecting IT
- 0day "In the Wild"
- Oracle GoldenGate 19c is available for download for Linux
- VDI 3D Graphics and Game Demo - Horizon, GRID, vGPU - The time I've wasted on technology...
- Outsourcing my life: Why I pay others to do tasks I could do myself
- ‘Temporary Insanity’ Returns To Wall Street – The Felder Report
- 6 Tech Trends Dominating DevOps in 2019 – Running Your Business
- 4 Reasons Why Using Resumonk Can Help You Land the job You've Always Wanted – Business Ideas
- 5 Amazing Statistics About Remote Companies – Business Ideas
- The Pink Tax: The Hidden Cost Of Being Female | Get Rich Slowly
- Should You Care About an Inversion in the Yield Curve? – Business Ideas
- Linux Scripting, Part II – DBAKevlar
- You Don’t Want To Be A Rock Star | The Networking Nerd
- Howto Reinstall WSUS from Scratch - The time I've wasted on technology...
- Start with "Why?" | Data Protection: Avamar, NetWorker, Data Domain, RecoverPoint, CSM
- Droplet Computing: The Drip, Drip Effect – Michelle Laverick…
- Mentoring Someone with Imposter Syndrome
- [Howto] ara – making Ansible runs easier to read and understand – /home/liquidat
- How to configure Windows Sandbox - Thomas Maurer
- Best Practices for Signing a Windows PowerShell Script
- Benchmarking Competencies for Digital Performance - Part 1 | APMdigest - Application Performance Management
- Setup SSH Keys on Ubuntu 18.04 - Low End Box Low End Box
- The Mythical Eight Hour Workday – Ethan Banks
- Get Shortcut contents in Powershell – Dimitri's Wanderings
- Powershell criticism: Part 2 – Dimitri's Wanderings
- Powershell criticism part 1 – Dimitri's Wanderings
- Start Stop service rights to non administrators – Dimitri's Wanderings
- Architecture for the cloud vs. on-premises – Dimitri's Wanderings
- Free Disk space on Windows drive – Dimitri's Wanderings
- Chris's Wiki :: blog/linux/AlpineOverNFSFix
- Chris's Wiki :: blog/linux/Ubuntu1804OddKernelPanic
- Data Breach revealed 1.5 Million Freedom Mobile Customers | Born's Tech and Windows World
- BitLocker management in enterprise environments | Born's Tech and Windows World
- Fifty Questions to Ask a Startup Founder During an Informational Interview — Stephanie Hurlburt
- Oracle 18c and 19c on Oracle Linux 8 (beta) | The ORACLE-BASE Blog
- Oracle Senior Architect: Web Logic Server 11g
- Writing Linux Scripts- Part I – DBAKevlar
- Top 10 Oracle E-Business Suite Security Risks | Integrigy
- Ethics in the AI, Machine Learning, Data Science, etc Era « Oralytics
- Python transforming Categorical to Numeric « Oralytics
- Data Sets for Analytics « Oralytics
- Guide to using and installing WSUS on Windows Server Core 2019 - The time I've wasted on technology...
- Machine Learning Tools and Workbenches « Oralytics
- APEX Connect 2019 - Day 3 - Blog dbi services
- APEX Connect 2019 - Day 2 - Blog dbi services
- APEX Connect 2019 - Day 1 - Blog dbi services
- IT And The Exception Mentality | The Networking Nerd
- VCP6.7-DCV Objective 7.15 - Utilize VMware vSphere Update Manager (VUM) | ESX Virtualization
- Fxmsp Chat Logs Reveal the Hacked Antivirus Vendors, AVs Respond
- Data Protection in a Multi-Cloud World | Architecting IT
- Making the Case for SAN 2.0 | Architecting IT
- QLC NAND - What can we expect from the technology? | Architecting IT
- SQL Server 2017 RTM CU14 + GDR Released - Microsoft Tech Community - 566368
- OS/2 Museum | OS/2, vintage PC computing, and random musings
- VCDX181.com - SAP grants support for SAP HANA 2.0 on VMware...
- Run WSUS cleanup and index script on Windows Server Core without SQL Management Studio - The time I've wasted on technology...
- VCP6.7-DCV Objective 2.3 - Describe the options for securing a vSphere environment | ESX Virtualization
- Apple Patches ZombieLoad Vulnerabilities - TidBITS
- Best Creamy Lemon Parmesan Chicken Recipe - How to Make Creamy Lemon Parmesan Chicken
- CLI Still Sucks for Automation · Lindsay Hill
- Amazon S3 Path Deprecation Plan – The Rest of the Story | AWS News Blog
- How to list the naa-numbers of LUNs and VMware VMFSs on a Dell EMC Unity system - 50mu - about storage
- Tom's Top Ten Things Executives Should Know About Software - ACM Queue
- SAP on AWS Update – Customer Case Studies, Scale-Up, Scale-Out, and More | AWS News Blog
- A List Of What Makes WiFi 6 Technically Better ? - EtherealMind
- CCNA Training » OSPF Neighbor Sim
- Real-Life Data Center Meltdown « ipSpace.net blog
- Webcast – Install & Configure SQL Server with PowerShell DSC | SQLvariations: SQL Server, a little PowerShell, maybe some Power BI
- Chatterbox is a DIY Kids Smart Speaker that Features Open-Source and Private Voice Assistant, Mycroft - Voicebot
- Top list of computer forensics software – Linux Hint
- Chris's Wiki :: blog/tech/TLSCertificateIdentity
- Turbonomic 2019 State of Multi-Cloud Report – vcdx133.com
- Japan Is Developing First Computer Virus To Prevent Cyber Crimes
- Adding USB 3.0 Drivers to Windows 7 Install Media | Windows OS Hub
- Improving Application Performance with NVMe Storage - Part 1 | APMdigest - Application Performance Management
- New Security Baseline for both Windows 10 and Windows Server | KC's Blog
- Powershell Backup Script-Sharing Knowledge | Erwin Bierens Blog
- CentOS 7 – Windows Active Directory Integration using SSSD | geekdudes
- The Idiot made a Smart Mirror – Jon Spraggins
- Powershell Enable / Disable / Set / Show Windows Web Proxy-Sharing Knowledge | Erwin Bierens Blog
- How to import your existing SSH keys into your GPG key ! even the horse knew
- How to manage multiple SSH keys | Opensource.com
- Dell Technologies World 2019 – (Fairly) Full Disclosure | PenguinPunk.net
- D4stiny (Bill Demirkapi) · GitHub
- 18 Quick 'lsof' command examples for Linux Geeks
- Raspberry Pi Streams Music Using Only the Default Linux Tools | Hackaday
- Open source security: The risk issue is unpatched software, not open source use - Help Net Security
- How to geotag photos on Linux with Otto | Tōkyō Made
- Data in a Flash, Part I: the Evolution of Disk Storage and an Introduction to NVMe | Linux Journal
- Routing from a single public IP with Azure Firewall -
- dnsperf | DNS-OARC
- GitHub - DNS-OARC/flamethrower: a DNS performance and functional testing utility (by @NS1)
- New Features Coming to Debian 10 Buster Release - It's FOSS
- Dell Technologies World 2019 – Media Session – Architecting Innovation in a Multi-Cloud World – Rough Notes | PenguinPunk.net
- Dell Technologies World 2019 – Wednesday General Session – Optimism and Happiness in the Digital Age – Rough Notes | PenguinPunk.net
- Dell Technologies World 2019 – Tuesday General Session – Innovation to Unlock Your Digital Future – Rough Notes | PenguinPunk.net
- Dell Technologies World 2019 – Monday General Session – The Architects of Innovation – Rough Notes | PenguinPunk.net
- Dell EMC Announces Unity XT And More Cloudy Things | PenguinPunk.net
- Free Veeam VMCE Study Guide Download | ESX Virtualization
- New – Amazon Managed Blockchain – Create & Manage Scalable Blockchain Networks | AWS News Blog
- New – Amazon S3 Batch Operations | AWS News Blog
- Building Serverless Pipelines with Amazon CloudWatch Events | AWS News Blog
- hashing - Is there a built-in checksum utility on Windows 7? - Super User
- certUtil -hashfile pathToFileToCheck [HashAlgorithm]
- Design BOMs & my vSAN licensing cheat sheet mind map – Elastic Sky
- vCenter Server Appliance CLI - JSON Creator · davidstamen.com
- Blue circle in the vSphere client after upgrading to vCenter Server 6.7 Update 2 - ivobeerens.nl
- Unimus
- PCI ASV Partners - Clone Systems, Inc.
- AWS re:Inforce 2019 – Security, Identity, and Compliance | AWS News Blog
- Network Security right from the Beginning – Introducing DHCP-over-TLS (DoT) •
- CISSP certificate - II. Personal experience - Security Art Work
- CISSP certificate - I - Security Art Work
- Helping CISOs and Board Members Communicate on Risk: A Shared Assessments Summit 2019 Recap | Security Architects Partners
- Windows Incident Response: Registry Transaction Logs, pt II
- Windows Incident Response: Latest Testing: The Windows Registry, pt I
- Windows Incident Response: LNK Files In The Wild
- Unhardened Web Servers in Tor Have No Anonymity – We are OSINTCurio.us
- Certificates: The OSINT Gift that Keeps on Giving… – We are OSINTCurio.us
- Basic OPSEC Tips & Tricks for OSINT researchers – We are OSINTCurio.us
- So You Want to Red Team? · System Overlord
- The Difference Between Classical Liberalism and Libertarianism | Daniel Miessler
- Cybersecurity | Daniel Miessler
- The Difference Between Goals, Strategies, Metrics, OKRs, KPIs, and KRIs | Daniel Miessler
- Optimizing a Security Assessment Engagement
- Django vs. the OWASP Top 10 - Part 1
- SANS Digital Forensics and Incident Response Blog | A few Ghidra tips for IDA users, part 2 - strings and parameters | SANS Institute
- SANS Digital Forensics and Incident Response Blog | A few Ghidra tips for IDA users, part 1 - the decompiler/unreachable code | SANS Institute
- SANS Digital Forensics and Incident Response Blog | A few Ghidra tips for IDA users, part 0 - automatic comments for API call parameters | SANS Institute
- Robert Penz Blog » Howto install Wireguard in an unprivileged container (Proxmox)
- Security baseline (DRAFT) for Windows 10 v1903 and Windows Server v1903 – Microsoft Security Guidance blog
- The Azure Security Model, Part 1 - Access Control Basics
- Cyber Security First Step for Industrial IoT - JPCERT/CC Eyes | JPCERT Coordination Center official Blog
- SOAR: Doing More with Less
- Google Online Security Blog: Gmail making email more secure with MTA-STS standard
- Google Online Security Blog: The Android Platform Security Model
- Errata Security: Programming languages infosec professionals should learn
- USWDS: The United States Web Design System
- Throw Away Drives | Diary of a Network Geek
- California Assembly’s Privacy Committee Votes to Weaken Landmark Privacy Law | Electronic Frontier Foundation
- Hardware Hacking 101 - Lesson 3: Abusing UART (U Are RooT) - The Ethical Hacker Network
- The growing demand for managed detection and response (MDR) | CSO Online
- Navigating the AI hype in security: 3 dos and 2 don'ts | CSO Online
- Why your business continuity and disaster recovery plans should account for EMP attacks and GMD events | CSO Online
- GandCrab attackers exploit recently patched Confluence vulnerability | CSO Online
- Facebook Setting Aside Up To $5 Billion For Privacy Violations : NPR
- Ransom amounts rise 90% in Q1 as Ryuk increases
- Guide: Three Pillars of Preventing Business Email Compromise and Wire Fraud
- Why Asset Management is so important for Vulnerability Management and Infrastructure Security? | Alexander V. Leonov
- After Pentagon Ends Contract, Top-Secret Scientists Group Vows To Carry On : NPR
- Cumulative Update #17 for SQL Server 2014 SP2 - Microsoft Tech Community - 462772
- Largest Leak in History: Email Data Breach Exposes Over Two Billion Personal Records - CPO Magazine
- Multiply time by asking 4 questions about the stuff on your to-do list |
- Java mon amour: Jenkins enable project based security
- Java mon amour: WebLogic Security documentation
- The Wistar network emulator | Open-Source Routing and Network Simulation
- 3 Flourishing Sales Funnel Examples You Ought to Learn From – Online Businesses
- Oracle Security Alert CVE-2019-2725
- Intel’s Optane: Two Confusing Modes. Part 3) App Direct Mode | The SSD Guy
- Oracle Database 19c (19.3) : Installations, RAC, Data Guard etc. | The ORACLE-BASE Blog
- ncubeeight: My 20 years of web
- Learn Ansible By Doing With These Courses And Hands-On Labs - Linux Academy
- Early warning system | Joinup
- blueprint for clinician-led open software design.
- iLO recovery broken flash | panticz.de
- Set Up ParseDMARC on Ubuntu 18.04, 16.04 Server to Analyze DMARC Reports
- VMware ESXi Boot Failure from USB or SD Card with HPe iLO Amplifier and InfoSight - The time I've wasted on technology...
- Blue Zones: Financial Lessons From the World’s Oldest People — My Money Blog
- Big Data Is Big Business: Here's How to Become a Data Analyst
- Market Guide for Cloud Workload Protection Platforms - Virsec Systems
- Kanboard 1.2.7 Multiple Vulnerabilities
- Threat Modeling Methodology | OCTAVE, STRIDE, PASTA,Trike, VAST
- ZeroSec - Adventures In Information Security
- ZephrFish (ZephrFish) / Repositories · GitHub
- DNS Service Discovery (DNS-SD)
- CoreDNS: DNS and Service Discovery
- Pragmatic Blog: Denis Rechkunov – Paranoid Habits. Security Tips
- Understand Your Sphere of Control | #Resolve2015 | Keri Duce | Gross, Point-Blank
- Shadowing RDS 2012 Sessions – Ryan Mangan's IT Blog
- GitHub - gabemarshall/eversec_ctf: Public repo for the Eversec CTF.
- Correlating build numbers and versions of VMware products (1014508)
- MARS_GUUG2016.pdf
- Thomas_Schoebel-Theuer_-_MARS_Light__Replicating_Block_Devices_over_Long_Distances.e2308.pdf
- The World's Largest Repository of Historical DNS data
- Tell it to your Teddy Bear | Talk About Quality
- Red Team Toolkit Essentials, Tim Roberts
- Introducing: Detection Lab – Chris Long – Medium
- Active Directory Visualization for Blue Teams and Threat Hunters
- Three ways to pass credentials in a Powershell Script | Energized About PowerShell
- Export all windows domain computers to CSV from windows | SvennD
- EU law could fine sites for not removing terrorist content within an hour
- GitHub - clong/DetectionLab: Vagrant & Packer scripts to build a lab environment complete with security tooling and logging best practices
- The Journey to Try Harder: TJnull’s Preparation Guide for PWK/OSCP | NetSec Focus
-
- DNS Ping Scans via Open Resolvers
- Cybersecurity Bill Of Materials For Medical Devices: What’s Next
- SPNEGO - Wikipedia
- IEZoneAnalyzer v3.5 with Zone Map Viewer – Microsoft's USGCB Tech Blog
- Slido - Audience Interaction Made Easy
- Sidewalk Labs' street signs alert people to data collection in use
- CIA claims Huawei is funded by Chinese state security
- Chris's Wiki :: blog/links/SystemDashboardDesign
- Using SetupDiag.exe to Diagnose Windows 10 Upgrade Errors | Windows OS Hub
- Organizations Fail to Test Cybersecurity Incident Response Plans | APMdigest - Application Performance Management
- How to Use the Microsoft Anti-Malware Script Interface
- Java and Tomcat Updates : Vagrant and Docker | The ORACLE-BASE Blog
- Linux Server Hardening Using Idempotency with Ansible: Part 3 | Linux.com | The source for Linux information
- Cloud Security » Linux Magazine
- WOPR: Security Loses Some of its Obscurity | Hackaday
- Transcending the Stack with the Right Network Protocol | Hackaday
- The CD Is 40, The CD Is Dead | Hackaday
- The fast WekaIO file system saves you money! - FastStorage
- Digital Trust & Safety: Go beyond fraud prevention with Sift | Sift
- RSS Guard 3.5.7 - Neowin
- VSCodium - The advanced editor
- Top 25 Best Free Medical Imaging Software for Linux System
- Cops Are Increasingly Using Google's Location History Data To Nab Criminals
- Driftnet on Debian: Sniffing images within a network – Linux Hint
- Data Collection Standards in Privacy Legislation: Proposed Language - Lawfare
- Principles of AI Governance and Ethics Should Apply to All Technologies - Lawfare
- Estate Planning for Your Digital Assets: Smart Planning for Your Digital Demise | DennisKennedy.Blog
- Skills for Tech Pros of Tomorrow - Part 1 | APMdigest - Application Performance Management
- Using SSH Keys to connect to your VPS – Low End Box
- Linux Blackhole Tutorial – Adding and Removing A Null Route – Low End Box
- Create Team and Channels with PowerShell |
- Home Lab Information Management – Notes from MWhite
- Monoprice Maker Ultimate 3D Printer Review: Part 1 - set up and initial print
- Is it Elastalert? No – it’s NiFi!! – David Vassallo's Blog
- Consuming Netflow using NiFi – David Vassallo's Blog
- Early Retirement Extreme: — a combination of simple living, anticonsumerism, DIY ethics, self-reliance, resilience, and applied capitalism
- What is a zombie (comatose) server, and why should I care?
- Dread Pirate Roberts 2, the 'guiding mind' of Silk Road 2.0, jailed for over 5 years
- Thomas White, the founder of notorious website Silk Road 2.0, has been jailed for five years and four months by a UK court.
White, also known as Dread Pirate Roberts 2, was charged with not only running Silk Road 2.0 -- the site through which he earned hundreds of thousands of dollars per day on the dark web
Silk Road 2.0 had been set up by White with Blake Benthall (also known as DefCon) from the US after the FBI closed down the original Silk Road marketplace in 2013. White's pseudonym (or one of them, at least), was a nod to Ross Ulbricht, who was arrested for running the first site and used the name Dread Pirate Roberts.
- 2019 Women in Tech Report - HackerRank
- Tax identities up for sale on the dark web
- previous year's W-2 forms and 1040 forms available on the dark web at relatively low cost, ranging from $1.04 to $52. Names, social security numbers and birthdates can be obtained for a price ranging from $0.19 to $62.
There are also how-to guides on illicitly cashing out tax returns available for as little as $5.
- PC-as-a-Service or managed device services? The difference matters
- 61 percent of CISOs believe employees have leaked data maliciously
- 79 percent of IT leaders believe that employees have put company data at risk accidentally in the last 12 months, and 61 percent believe they have done so maliciously.
- 8 out of 10 top vulnerabilities target Microsoft products
- Eight out of 10 vulnerabilities exploited via phishing attacks, exploit kits, or RATs were targeting Microsoft products.
- 802.11ax Is NOT A Wireless Switch | The Networking Nerd
- Data center and server room considerations: What you need to know
- New VMware Security Advisory VMSA-2019-0006 - VMware Security & Compliance Blog - VMware Blogs
- Rubrik Color-Coded VM Backup Reports – Virtually Sober
- An Intro to OpenCensus - SFlanders
- virt-install + nbdkit live install | Richard WM Jones
- The Wide World of Microsoft Windows on AWS | AWS News Blog
- Windows 10 1809 and later slow on VMware | blog.erben.sk
- The issue is identified to be due to some guest OS behavior change in this version of windows 10, 1809 w.r.t thin provisioned disks and snapshots, this has been confirmed as a bug and will be fixed in the following releases – 6.5 U3 and 6.7U3, which will be released within End of this year (2019).
- 3-2-1 Backup Best Practices Using the Cloud
- 3 types of Navigation in SharePoint Online - SharePoint Maven
- The world of cybersecurity in numbers
- OSINT Framework | KC's Blog
- The EU releases guidelines to encourage ethical AI development
- Log2Ram: Extending SD Card Lifetime for Raspberry Pi LoRaWAN Gateway | MCU on Eclipse
- Under The Stairs: PowerShell 7 - Coming Soon!
- Windows hard disk space disappears – Offline files – MILOSZENGEL.com
- Lynis Overview & Installation – Low End Box
- Protecting the privacy interests of others – Blog FiascoBlog Fiasco
- Comparing and Syncing IIS Configurations - Devops Blog
- Top Colleges Aren't What You Think : NPR
- How To SlipStream Latest VMware ESXi patches into an Installation ESXi ISO File | ESX Virtualization
- Artificial Intelligence Could Improve Mammogram Accuracy : Shots - Health News : NPR
- Freed from storage failure by FreeNAS - MYstIC G
- Vrnetlab: Emulate networks using KVM and Docker | Open-Source Routing and Network Simulation
- Screen and Web scraping
- Automatic Clean-and-Updated Firewall Ruleset « ipSpace.net blog
- First Look: Microsoft Healthcare Bot | Tallan Blog
- 15 Practical Python Set Examples with a Sample Program
- Understanding lifecycle management complexity of datacenter topologies | the morning paper
- CephFS: a beginner's guide – Marksei
- joeware – never stop exploring… :) » Blog Archive » LDAP Ping and Determining Your Machine’s Site
- Cloud computing simplified: a Berkeley view on serverless computing | the morning paper
- Let’s talk about trace flags - Microsoft Tech Community - 386061
- Cumulative Update #16 for SQL Server 2014 SP2 - Microsoft Tech Community - 391101
- What if the Actual Execution Plan was always available for any query? - Microsoft Tech Community - 393387
- How To Configure a Shared Mailbox in Office 365. – TDSheridan Lab
- An example why NAT is NOT security | Sebastian Neef - 0day.work
- Active Directory Audit: Why and How | Security Architects Partners
- Ansible Dynamic Inventory for Proxmox | Lisenet.com :: Linux | Security | Networking
- Healthcare Exchange Standards: State of Healthcare Provenance today
- The 12 Worst Serverless Security Risks
- Install OpenVAS (GVM) on Kali 2019
- How CISOs should respond to the cybersecurity crisis
- The Role of Analytics in Protecting Healthcare Data Privacy and Security
- Trojan Horses for the Mind, Part 2 of Building Impactful Security Awareness Messaging
- Trojan Horses for the Mind
- Threat Detection for your Network using Kfsensor Honeypot
- Comprehensive Guide on Netcat
- In its ransomware response, Norsk Hydro is an example for us all
- Historical Communications Security | Diary of a Network Geek
- The buzz at RSA 2019: Cloud security, network security and more | CSO Online
- Under Attack: Over Half of SMBs Breached Last Year
- Threat Hunting 101: Not Mission Impossible for the ...
- 40% of Organizations Not Doing Enough to Protect ...
- 20 Years of STRIDE: Looking Back, Looking Forward - ...
- Adam Shostack
- 6 Essential Skills Cybersecurity Pros Need to ...
- The Matrix at 20: A Metaphor for Today's ...
- 12 tips for effectively presenting cybersecurity to the board | CSO Online
- Windows security updates that require new registry keys | CSO Online
- 7 keys to a successful IT security career | CSO Online
- The 6 biggest ransomware attacks of the last 5 years | CSO Online
- Cr1ptT0r Ransomware Targets NAS Devices with Old Firmware
- Dharma ransomware recovery rates fall as ransom demands skyrocket
- How to rotate your source IP address - Black Hills Information Security
- Oracle mail warns about a critical Java 8 update coming | Born's Tech and Windows World
- Security: Windows-Spoofing via .reg files | Born's Tech and Windows World
- Patch Lady – Domain admins and issues with KB4489878 @ AskWoody
- DTrace for Windows available | Born's Tech and Windows World
- This free AI reads X-rays as well as doctors
- What about a 3D Printed Mini-ITX NAS Case? - briancmoses.com
- Treat staff like adults and equals | The IT Skeptic
- Invalid State of a Virtual Machine on VMWare ESXi | Windows OS Hub
- 4 ITSM Priorities for Digital Transformation | APMdigest - Application Performance Management
- Under The Stairs: Moving from PowerShell Journeyman to PowerShell Master
- How to Fix “Trust relationship has failed” Error
- Upgrade Windows Server from Evaluation to Full
- Desired State Configuration in PowerShell
- Attach a USB Device to a Virtual Machine in VMware
- How to Split a Windows Image File (WIM to SVM)
- Automating The Installation Of VMware ESXi With PowerCLI
- VMware: Change IOPS Limit From 1000 to 1 | PeteNetLive
- Quick and Dirty Image Factory with MDT and PowerShell | Keith's Consulting Blog
- Do You Need to Update KRBTGT Account Password? | KC's Blog
- Chris's Wiki :: blog/tech/NVMeAndTechChange
- Chris's Wiki :: blog/sysadmin/OurDNSCircularDependency
- Check if Powershell Script is Running as Administrator using Snippet
- Product roadmaps are inferior to product forecasts – Blog FiascoBlog Fiasco
- Exploiting Poor SMB Configuration – ls /blog
- gallery-dl - Download Image Galleries And Collections From The Command Line - Linux Uprising Blog
- code integrity vs data security
- The impact of the GDPR - privacy matters
- openDCIM - Open Source Data Center Infrastructure Management
- Security clashes with cloud: Offensive Security CEO talks cultural mindsets, leadership challenges | ZDNet
- radare
- FinalCrypt - Free One Time Pad Encryption
- GitHub - google/grr: GRR Rapid Response: remote live forensics for incident response
- MIG: Mozilla InvestiGator
- GRR Rapid Response: remote live forensics for incident response - LinuxLinks
- IOInsight
- As Built Report | Tim Carman
- Chinese Woman Carrying Malware Allegedly Got Into Mar-a-Lago
- Mar-a-Lago's Security Problems Go Way Beyond a Thumb Drive | WIRED
- Latest Ransomware 'Xwo' Attacks PCs With Default Passwords
- Xwo
- Format your log messages in Python - Blog - syslog-ng Community - syslog-ng Community
- Security Researchers say Half Of Industrial Control System Networks Have Faced Cyber Attacks – ls /blog
- 5 open source tools for teaching young children to read | Opensource.com
- USB4: What this future standard means for USB chaos and Thunderbolt 3 | PCWorld
- The Best Antivirus Programs for Ubuntu - Make Tech Easier
- Different Ways To List Directory Contents Without Using ls Command
- Automation Could Help Organizations Manage Risk: Cybersecurity Research
- Episode #206 Running Django in Production - [Talk Python To Me Podcast]
- Former Senate IT worker pleads guilty to doxxing senators on Wikipedia
- Microsoft is shutting down its HealthVault patient record service
- US Household Spending Breakdown: Top 20% vs. Bottom 20% — My Money Blog
- My life philosophy: 50 lessons from 50 years
- The Best Business Books for Students Who Want to Be Financially Literate
- UN says US fears over Huawei’s 5G are politically motivated
- HCIBench 2.0 is Here! — ThinkCharles.net
- Indian health agency exposes details on millions of pregnant women
- Oracle 18c/19c and ActiveDirectory – Laurent Schneider
- The Renaissance of Data ONTAP | Architecting IT
- Windows Server 2019 Licensing Calculator - VirtuallyInclined.com
- Windows Server 2019 Comparison | Microsoft
- An Intro to Observability - SFlanders
- Datera and the Rise of Enterprise Software-Defined Storage | PenguinPunk.net
- New Veeam Backup & Replication Community Edition for home labs is free! | TinkerTry IT @ Home
- Terence Luk: Using wmic (Windows Management Interface Command) to remotely uninstall applications
- VAST Data – No More Tiers Means No More Tears? | PenguinPunk.net
- Glenn K. Lockwood: VAST Data's storage system architecture
- VAST decouples compute and storage – Blocks and Files
- VAST Data's Universal filesystem – Blocks and Files
- VAST Data: The first thing we do, let's kill all the hard drives – Blocks and Files
- Spectre/Meltdown Performance Impact Across Eight Linux Distributions - Phoronix
- Backups | Roadmap to Securing Your Infrastructure - Linux Academy Blog
- Wiping harddisks in 2019 - Daniel Lange's blog
- Essential System Tools: Firejail - Excellent Security Sandboxing - LinuxLinks
- Protection Poker: An agile game for mitigating risk | Opensource.com
- Antennas in Linux | Linux Journal
- Kali Linux Forensics Tools – Linux Hint
- SMB Exploited – ls /blog
- Being open builds trust | Joinup
- 25 Most Common IoT Security Threats in an Increasingly Connected World
- Economical append-only offsite backups with restic and Wasabi on Debian 10
- AWS Careers: On the Road to All 9 AWS Certifications - Linux Academy Blog
- MITRE names The Document Foundation as a CVE Numbering Authority (CNA) - The Document Foundation Blog
- How to install the OpenVAS security audit tool on Ubuntu Server 18.04 - TechRepublic
- sudo add-apt-repository ppa:mrazavi/openvas
sudo apt-get update
sudo apt install sqlite3 openvas9 libopenvas9-dev -y
sudo greenbone-nvt-syncsudo greenbone-scapdata-sync
sudo greenbone-certdata-sync
sudo systemctl restart openvas-scanner
sudo systemctl restart openvas-manager
sudo systemctl restart openvas-gsa
sudo systemctl enable openvas-scanner
sudo systemctl enable openvas-manager
sudo systemctl enable openvas-gsa
sudo openvasmd --rebuild --progress --verbose
sudo openvas-check-setup --v9
- SAP Open Sources Java SCA Tool
- Why Trust Is Key for Cyber-Security Risk Management
- Open Source Healthcare Visualizations
- “Severe” ransomware attack cripples big aluminum producer | Ars Technica
- Happy Birthday SAP Linux Lab! | e3zine.com
- NetBIOS Auxiliary Modules – ls /blog
- HAProxy - a journey into multithreading (and SSL)
- 10 Excellent Web Project Management Software - LinuxLinks
- These are the most insecure programming languages | ZDNet
- How Lockergoga took down Hydro — ransomware used in targeted attacks aimed at big business
- LockerGoga: The Dangerously Changing Face Of Ransomware
- What You Need to Know About the LockerGoga Ransomware - Security News - Trend Micro USA
- Configure two node Squid (Proxy Server) Clustering using Pacemaker on CentOS 7 / RHEL 7
- The Ingredients of a Successful Digital Transformation Strategy
- GitHub - edmunds/shadowreader: Serverless load testing for replaying production traffic. Powered by AWS Lambda.
- CopperheadOS' Android Pie update is now available for the Pixel & Pixel 2
- CopperheadOS
- 5 Ceph storage questions answered and explained
- Digital transformation, cultural modernization cannot be mutually exclusive - Federal News Network
- How to Set Up OpenStreetMap Tile Server on Ubuntu 18.04
- DSHR's Blog: Compression vs. Preservation
- Key takeaways on upgrading to Java 12
- JAVA 12 Series Index
- Quick guide to typeperf for Windows performance monitoring | Erik Wramner
- Oracle E Business Suite and Java Security What You Need to Know | Integrigy
- Oracle RAC vs. SQL Server AG – DBAKevlar
- DeployHappiness | Making Life Hard for a Phisher – How to Report a Phishing or Malicious Website
- Fast copies with Solaris 11.4 | rootpool
- Intel’s Optane: Two Confusing Modes. Part 2) Memory Mode | The SSD Guy
- Intel’s Optane: Two Confusing Modes. Part 1) Overview | The SSD Guy
- I can't stand world backup day | Data Protection: Avamar, NetWorker, Data Domain, RecoverPoint, CSM
- PSA: Isilon L3 cache does not enable with a 1:1 HDD:SSD ratio - FastStorage
- How To Install SQL Server 2019 on Linux (CentOS) - Mohammad Darab
- DHS issues warning about Medtronic implantable defibrillator flaws
- iTWire - Norwegian firm attack likely through Microsoft Active Directory: claim
- Norsk Hydro
- Benchmarking A 10-Core Tyan/IBM POWER Server For ~$300 USD - Phoronix
- Oracle vs. SQL Server Architecture – DBAKevlar
- iLO - IPMI on HP servers | panticz.de
- 40 Linux Server Hardening Security Tips [2019 edition] - nixCraft
- Bare-Bones Monitoring with Monit and RRDtool | Linux Journal
- There’s Something About Service Accounts – Active Directory Security
- What is SNIA’s Persistent Memory Programming Model? | The SSD Guy
- Terence Luk: Security tab for Internet Explorer 11 displays a lock key icon for Internet, Local intranet, Trusted sites, and Restricted sites zones
- Docker tips and tricks for your Go projects | Marco Franssen
- VCP6.7-DCV Objective 1.10 - Describe a virtual machine (VM) file structure | ESX Virtualization
- New – Gigabit Connectivity Options for Amazon Direct Connect | AWS News Blog
- Azure Blueprints: ISO27001 Shared Services - Eric’s Azure Blog
- GitHub - StreisandEffect/streisand: Streisand sets up a new server running your choice of WireGuard, OpenConnect, OpenSSH, OpenVPN, Shadowsocks, sslh, Stunnel, or a Tor bridge. It also generates custom instructions for all of these services. At the end of the run you are given an HTML file with instructions that can be shared with friends, family members, and fellow activists.
- vSphere 6.7 Basics – Part 2 – vCenter Server Appliance Install – vcdx133.com
- Migrating DB2 Databases to Azure – DBAKevlar
- Nested ESXi Templates - EverythingShouldBeVirtual
- Azure Blueprints - Eric’s Azure Blog
- Putting AWS security services to work for you | AWS News Blog
- Alien Pastures » Explorations into the world of electronic music production
- 100 Useful Vim Commands That You'll Need Every day
- The Quiet Spread of Data Brokers Selling Your Personal Information - TidBITS
- Windows Persistence with PowerShell Empire
- Businesses Warned of Malware Spread via LinkedIn Job Offers
- Thousands of patients impacted by ransomware attack at medical billing company
- Episode 008 - What is Software Testing? - The Evil Tester Show - EvilTester.com
- Are there any programming Katas related to testing? - EvilTester.com
- What is Software Testing And Why Do We Test Software? - EvilTester.com
- Massive Database Leak Gives Us a Window into China’s Digital Surveillance State | Electronic Frontier Foundation
- Learn about computer security with the Raspberry Pi and Kali Linux | Opensource.com
- Powershell – Windows firewall rules with ports – Luka Gros
- Defending Against Remote Desktop Protocol Attacks – The Back Room Tech
- Powershell and Lotus Notes pt3 – Luka Gros
- News about the broken MSComCTL.ocx updates on Office | Born's Tech and Windows World
- MSComCTL.ocx
- The Anatomy of an AWS Key Leak to a Public Code Repository | Technodrone
- A brief history of the admins time | rootpool
- Tech Refresh as Part of an Effective Vulnerability Management Program: Part Three - Delta Risk
- Opening a New Door of Opportunity | Thom Langford
- Axonius' 'Unsexy' Tool Wins RSAC Innovation Sandbox ...
- Axonius
- It's Time to Rethink Your Vendor Questionnaire
- Vulnerability Management at Tinkoff Fintech School | Alexander V. Leonov
- An all-in-one cyber toolkit for criminal investigations - Purdue University News
- Equifax defends against scathing Senate report
- Paravirtualization
- Spy Games: the NSA and GCHQ Offer Their Software to the Open Source Community | Linux Journal
- GitHub - eerotal/LibreSignage: An open source digital signage solution
- 13-Yr-Old Girl Arrested In Japan For Posting Infinite Loop Code
- Linux In Safety-Critical Systems Is Coming Soon With Project ELISA
- ELISA
- iGen and Cyber Security Research | Whitepaper | SANS Institute
- DIY Portable KVM Crashcart From Recycled Laptop Provides VGA Display and USB Keyboard Touchpad With Optional Raspberry Pi: 14 Steps
- As the web turns 30, is it an out-of-control monster? - Japan Today
- Assessing your disk performance and your needs: Analyzing collected data (Part 2) – Dynamics AX in the Field
- Assessing your disk performance and your needs: Collecting relevant data (Part 1) – Dynamics AX in the Field
- SignalsEverywhere Video: SDRAngel How to Receive Basics Tutorial
- The Essential Microsoft Excel Formulas and Functions Cheat Sheet
- The Problem With ERP - IT Jungle
- Who Invented the First Computer and When? We Investigate
- Changes to Garbage Collection in Java 12
- Java mon amour: Kubernetes cheat sheet 2
- Java mon amour: Kubernetes cheat sheet 3
- IDEAS IN FOOD: Fried Angel Hair Parm
- Here's Why IT Teams Spend Too Much Time on Network Troubleshooting | APMdigest - Application Performance Management
- Making A Hammer With Beautiful Engravings | Hackaday
- This Cardboard Box Can Tell You What It Sees | Hackaday
- U.S. GAO - DOD Training: U.S. Cyber Command and Services Should Take Actions to Maintain a Trained Cyber Mission Force
- Remembering Eisenhower’s Middle East Force Resolution - Lawfare
- DSHR's Blog: Demand Is Far From Insatiable
- Raspberry Pi based indoor air quality monitor « Dangerous Prototypes
- DIY NAS: 2019 Edition - briancmoses.com
- Pepperdata Releases Free Big Data Cloud Migration Cost Assessment | APMdigest - Application Performance Management
- Reinventing ITSM? It's Not Going Away - Part 2 | APMdigest - Application Performance Management
- Reinventing ITSM? It's Not Going Away - Part 1 | APMdigest - Application Performance Management
- Which Windows Server 2019 Installation Option should I choose? - Thomas Maurer
- Chris's Wiki :: blog/sysadmin/ScriptsPromptImprovements
- PowerShell Automation Script for IIS installation and more. | Nerd Drivel
- Spectre and VMWare – Stuff I'm Up To
- Oracle 19c Automatic Indexing — How well it’s understood?
- Get All DCs in the Entire Forest | Mohammed Wasay
- Stop audio pops on Intel HD Audio · major.io
- Downgrade HP TPM From TPM 2.0 to TPM 1.2 - Daniel Classon
- Generating Various Types of Group Policy Reports | KC's Blog
- Exploiting secondary data with NDAS from NetApp | Architecting IT
- Applocker and PowerShell: how do they tightly work together? | >_
- Degrading qemu performance in DooM – Virtually Fun
- Getting started with Pulumi on Azure - Cloud for the win!
- Pulumi
- My awesome-podcasts List | Technodrone
- Sysadmin Stories: Running Veeam PowerShell Scripts in Non-Interactive Mode - Credentials
- End of an era, Linux to Deprecate a.out support – Virtually Fun
- BlgNetAutoSol/2_Easy_Wins at master · writememe/BlgNetAutoSol · GitHub
- Iranian hackers stole terabytes of data from software giant Citrix
- Free Morningstar Premium Mutual Fund Reports via Public Library Card — My Money Blog
- Warren Buffett CNBC Interview 2019 Full Video, Full Transcript, and Notes — My Money Blog
- Personal Finance on a 3×5 Index Card: Classic and New Young Adult Version — My Money Blog
- Big Data Is Big Business: Here's How to Become a Data Analyst
- What is money for? An evening with Vicki Robin
- Faster and bigger SSDs enable us to talk about something else than IOps - FastStorage
- How To Create A Recovery Services Vault In Azure - Blog dbi services
- Easter Egg in the Server Config Doc and How to configure Domino to restrict which groups can receive Internet mail | The Notes Guy in Seattle
- Mark Zuckerberg outlines a 'privacy-focused' revamp of Facebook
- Capsule8 Expands Linux-Based Threat Detection Platform for PCI DSS
- How To Create Fillable PDF Forms With LibreOffice Writer - Linux Uprising Blog
- SAP builds its own Java distribution | InfoWorld
- NIST and DFARS and Cyber Compliance! (oh my) « Virginia PTAP at George Mason University
- DFARS & NIST & Incident Reporting - Exostar NIST 800-171 - Exostar Documentation
- Compliance with DFARS 252.204-7012 & NIST 800-171; Expect 2019 to be the year of audit and enforcement - CyberSheath
- DFARS_final.pdf
- a495389.pdf
- 1018805.pdf
- More Than 22,000 Vulns Were Disclosed in 2018, 27% ...
- 7 cheap or free cyber security training resources | CSO Online
- The cybersecurity legislation agenda: 5 areas to watch | CSO Online
- The CSO and CPO role just dramatically expanded overnight | CSO Online
- Bare-metal cloud servers vulnerable to Cloudborne flaw | CSO Online
- The RDP Through SSH Encyclopedia - Black Hills Information Security
- Ransomware attacks hit Florida ISP, Australian cardiology group | CSO Online
- Unified Interface: Internet Explorer 11 Browser Update Issue – Dynamics 365 Customer Engagement Team Blog
- 'Car Talk' Lives On In Medical Education, Teaching Med Students How To Diagnose : Shots - Health News : NPR
- 5 Strategies For Answering Kids' (Super) Tough Questions : NPR
- Java mon amour: Kubernetes cheat sheets
- Java mon amour: Excellent Kubernetes Developer Certification training on Udemy
- Java mon amour: CKA Certification (Kubernetes Administrator)
- How to Sharpen Your Interview Skills With These Soft Skills Questions
- How to Record and Stream Live TV With Raspberry Pi
- HOWTO: Microsoft Certification Exam Preparation Generator – Please Work
- Leigh Johnson’s Guide To Machine Vision On Raspberry Pi | Hackaday
- Stethoscopes, Electronics, and Artificial Intelligence | Hackaday
- Hack My House: Raspberry Pi as a Touchscreen Thermostat | Hackaday
- 5 tips to help CIOs overcome patching problems
- DSHR's Blog: Economic Models Of Long-Term Storage
- Weather Station Project Overview
- Gartner: CIOs Will Be as Responsible for Culture Change as Chief HR Officers | APMdigest - Application Performance Management
- BitSight: Security Ratings Leader - Cyber Risk Management
- Home endpoints twice as likely to be infected as businesses
- The Surprising Secret to Improving Employee Engagement | Beth's Blog
- Ten things you need to know about Pass-through Authentication - The things that are better left unspoken
- Thoughts on VPNs for Road Warriors - Scott's Weblog - The weblog of an IT pro focusing on cloud computing, Kubernetes, Linux, containers, and networking
- The Strategy Private School Endowments Love the Most | Institutional Investor
- VulnReport Install ·
- First look on the new Azure Sentinel cloud-native with Azure Notebooks free service #Jupyter #SIEM #SIEMaaS #Azure #Sentinel | Robert Smit MVP Blog
- Learning about containers | Nelson's log
- Why I write my resume in LaTeX | Logan Marchione
- Security Thoughts: Veeam Backup & Replication leaks Azure Password in log - The things that are better left unspoken
- Saving regret — and how to avoid it
- The Trouble with Troubleshooting | APMdigest - Application Performance Management
- Chris's Wiki :: blog/sysadmin/PrometheusSubqueriesMathOverTime
- Diving into Merkle Trees
- PureBoot, the High Security Boot Process – Purism
- Strategies for securing container deployments | ITProPortal
- 5 Useful Tips for Better Tmux Terminal Sessions
- Reducing security risks with centralized logging | Opensource.com
- Full API lifecycle management: A primer - Red Hat Developer Blog
- An LA hospital will put Alexa in over 100 patients' rooms
- France’s New Offensive Cyber Doctrine - Lawfare
- Introduction to spatial joins with QGIS | Opensource.com
- Twenty years of U.S. government inflation data
- Berkshire Hathaway 2018 Annual Letter by Warren Buffett — My Money Blog
- Who Shoulders the Burden of Federal Income Taxes?
- You MUST patch 12.1.0.1 and 11.2.0.3 and older before June 2019
- The Cloud Migration Journey Series – Ather Beg’s Useful Thoughts
- SignalsEverywhere Podcast EP1: Es’hail-2, Favorite RTL-SDR Blog Posts and What SDR Should I Get?
- A Sense of Urgency: Money Can’t Buy You More Time — My Money Blog
- Internet gatekeeper warns of 'ongoing and significant' DNS attacks
- Hacking Amazon dash buttons, the hard way, with OpenWRT – Huan Truong's Pensieve
- OSSEC Installation Guide for Ubuntu - < 10 min to Raise the Defences
- Wireshark Tutorial and Tactical Cheat Sheet | HackerTarget.com
- Tcpdump Examples - 22 Tactical Commands | HackerTarget.com
- 22 SSH Examples, Practical Tips & Tunnels | HackerTarget.com
- Ubuntu, DNS, and sudo | Nelson's log
- Adding Cover Art to FLAC file from Command Line and GUI - Life of a Geek Admin
- How To Mount and Unmount ISO files using PowerShell - Life of a Geek Admin
- Nessus, OpenVAS and Nexpose VS Metasploitable
- eurobsdcon_silbersack.pdf
- Michael James Silbersack
- 800 Free eBooks for iPad, Kindle & Other Devices | Open Culture
- pki - CAC enable JBoss - Stack Overflow
- External and Federal PKI Interoperability
- TCP timestamps - ForensicsWiki
- Mitigating End of Life Technology by Bill Keyworth: BSMReview.com
- Useful WMIC Queries Computer Info | g.fisk
- Remote Desktop – Black Screen Of Death | g.fisk
- Network performance with VMXNET3 on Windows Server 2016 - Life of a Geek Admin
- Disable TCP and ICMP Timestamps - Whonix
- Patch Tuesday, February 2019 Edition — Krebs on Security
- Replacing default certificates with CA signed SSL certificates in vSphere 6.x (2111219)
- Configuring CA signed certificates for ESXi 6.0 hosts (2113926)
- Replacing ESXi SSL Certificates and Keys
- Sleeping at Night: Cybersecurity, Patient Safety and the Radiology Department
- Building A Cybersecurity Team in Radiology | Imaging Technology News
- Cybersecurity for Medical Imaging Departments – LINK
- Cybersecurity Increasingly Critical for Medical Imaging
- How to Choose Between Penetration Tests and Vulnerability Scans | EdTech Magazine
- Welcome to MWR Labs - Cyber security research and development
- CISSP Exam Changes: Tips and tricks to pass the new CAT format - YouTube
- (172) MF Prod - YouTube
- (172) Free CISSP Study Questions of the Day from IT Dojo - YouTube
- (172) Larry Greenblatt - CISSP 2018 Exam Tips - YouTube
- DoD Approved 8570 Baseline Certifications
- Major Security Breach Found in Hospital and Supermarket Refrigeration Systems
- ONTAP 9 Antivirus Configuration Guide - ECMLP2492609
- What is EMC's CAVA / Common Event Enabler? - THE SAN GUY
- Anti-virus on VNX CIFS Servers » Cyberfella Ltd
- Programming Books You Wish You Read Earlier
- 2019 Update on frameworks, standards, and regulations for infosec - Security Boulevard
- Top 30 Information Assurance Analyst Interview Questions and Answers for 2019
- Brain-hacking: Why Social Engineering is so effective - Security Boulevard
- CIPHER Selected as Top 10 Best Performing MSSP
- When it Comes to NIST 800-171 Compliance – There’s ‘On Time’ and There’s ‘Lombardi Time’ - Security Boulevard
- Cyberattacks in a Global Supply Chain: How Compliance Officers Can Mitigate Risk - Security Boulevard
- The Complete Application Security Checklist | Synopsys
- The Route of a Text Message, a Love Story - Motherboard
- DFARS Cybersecurity Audits: What to Expect
- Lessons learned from the Microsoft SOC—Part 1: Organization - Microsoft Secure
- Toyota Australia driven offline by cyber attack, as heart hospital hit by ransomware
- HoneyPy - A Low To Medium Interaction Honeypot - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- OSFClone - Open Source Utility To Create And Clone Forensic Disk Images - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- These Are the Countries With the Best and Worst CybersecuritySecurity Affairs
- Best practices for handling gaps in cloud security - TechRepublic
- Remember, data privacy is always the end goal of any security measure; don't lose sight of this fact: Protecting information is the top priority.
- Free Tool: Honey FeedSecurity Affairs
- ATT&CKized Splunk - Threat Hunting with MITRE’s ATT&CK using SplunkSecurity Affairs
- Windows® Domain Controller and Zero Trust Security | JumpCloud
- Benefits of OpenLDAP™ | JumpCloud
- How to Turn a Raspberry Pi Into a VPN-Secured Travel Router
- The Rise of Ransomware and the Consequences for SMBs
- 11 Takeaways: Targeted Ryuk Attacks Pummel Businesses
- Healthcare Exchange Standards: Segmenting Sensitive Health Topics
- Japan Security Analyst Conference 2019 -Part 2- - JPCERT/CC Eyes | JPCERT Coordination Center official Blog
- Iptables Essentials - Common Firewall Rules And Commands - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- Powershell – My Setup at Work as a SysAdmin
- SEAL Training | Diary of a Network Geek
- Hacking Healthcare Live: Bits and Bytes Meet Flesh and Blood ~ Cyber Thoughts
- Ryuk Ransomware, Exploring the Technical and Human Connections
- Six tips for securing identity in the cloud – Microsoft Azure Government
- The cybersecurity legislation agenda: 5 areas to watch | CSO Online
- 7 cheap or free cyber security training resources | CSO Online
- DIY X-Ray Machine Becomes CT Scanner | Hackaday
- The Woeful World of Worldwide E-Waste | Hackaday
- Exploration of Cooking
- Bullet Journaling for Nonprofit Professionals | Beth's Blog
- Industrial Security | Tenable®
- Dtex Systems - User Behavior Intelligence
- DeployHappiness | A Universal Naming Scheme for Your Devices
- 83 percent of US organizations have accidentally exposed sensitive data
- The five most common technologies that have led to accidental data breaches by employees are external email services like Gmail and Yahoo (51 percent), corporate email (46 percent), file sharing services like FTP sites (40 percent), collaboration tools such as Slack and Dropbox (38 percent), and SMS/Messaging Apps like G-Chat and WhatsApp (35 percent).
- Wandera | Mobile Security
- Jaffar's (Mr RAC) Oracle blog: What's new in 19c - Part III (Data Guard)
- Japan scholar and translator Donald Keene dies at 96 - Japan Today
- Comprehensive Guide on Snort (Part 1)
- I'm resigning from SANS - Black Hills Information Security
- Spectre is here to stay An analysis of side-channels and speculative execution
- Data lakes, observability, and making devs awesome - SysAdmin1138 Expounds
- SEC575_iOS12_AndroidPie_Handout.pdf
- How to make Email Bot service in Python | Alexander V. Leonov
- The Average Cost of Fighting a Cyberattack Now Exceeds $1.1M | DEVOPSdigest
- $1.1M
- Automating snapshots with pyznap on Centos 7 | SvennD
- Bureaucracy survival skills – Blog FiascoBlog Fiasco
- What happened with Citrix Printing throughout 2018?!
- smbclient receiving error message: protocol negotiation failed: NT_STATUS_CONNECTION_DISCONNECTED | setaOffice
- Vulnerababe UNACEV2.DLL puts software like WinRAR at risk | Born's Tech and Windows World
- 7-Zip Version 19.00 released | Born's Tech and Windows World
- End of General Support for vSphere 6.0 - Davoud Teimouri
- 30! TIPS on how to use Amazon Web Services (AWS) more efficiently – multiple cost savers included
- Version 2.0 of the Cloud Services Cheat Sheet is now live. Get it here!
- New Community (book) project – Byte sized Cloud design principles and architectural recommendations
- 'Yame-hara' - pressuring resigning workers not to quit - Japan Today
- Yame-hara
- Oracle Multimedia will be removed in Oracle Database 19c
- Oracle 18c Express Edition (XE) for Windows is available
- Jaffar's (Mr RAC) Oracle blog: What's new in 19c - Part II (Automatic Storage Management - ASM)
- Jaffar's (Mr RAC) Oracle blog: Whats new in 19c - Part I (Grid Infrastructure)
- DigitalOcean launches its managed database service | TechCrunch
- Re-Imagining Virtualization with Kubernetes and KubeVirt - Part II – Red Hat OpenShift Blog
- Monte Carlo Simulation with Python - Practical Business Python
- How to Automate FFmpeg and Bento4 With Bash Scripts
- CPDP2019 Computers, Privacy and Data Protection conference
- 7 Key Considerations for Kubernetes in Production - The New Stack
- Script to create mount points in LVM - Kernel Talks
- How to Create Bootable Ubuntu 18.04 USB Stick on Linux | Linuxize
- Implementing Dstat with Performance Co-Pilot
- Open Science, Open Source and R | Linux Journal
- vCenter 6.5 HA Installation and Configuration - vembu
- Configuring vCenter HA - Part 1 - vembu
- How To Migrate Shares and Files with ease by using Microsoft Storage Migration Service - Part 2 | ESX Virtualization
- NVMe-oF Support is now Released! | Cody Hosterman
- NVMe-oF
- Upgrading a Basic vCenter 6.5 HA Cluster to vCenter HA 6.7 U1 – The Wifi-Cable
- Tips for writing Vester test files, part 2 | Adventures in a Virtual World
- This vegetable curry has bold flavors to keep everyone happy - Japan Today
- Basics – The FARR Model | Data Protection: Avamar, NetWorker, Data Domain, RecoverPoint, CSM
- Fault tolerance: This is your baseline protection against individual storage component failure. If a disk (or flash) drive fails, you don’t want to lose your data. While we take fault tolerance for granted as something we can control and see alerts for within an on-premises environment, there’s less visibility and control in public cloud. More so, fault tolerance doesn’t give you protection from anything other than storage unit failure.
Availability: “If a tree falls in the forest and no-one hears it, does it really make a noise?” That’s the old philosophical question that availability skirts around: if your data is online and error free, but you can’t access it, is it actually usable? Availability is about making sure you have protection against losing connectivity to the data/workload. For example: if your workload is one presented only back into the business, and the link between the business and the VPC in which it is running is lost, how do you get access to it again? Do you plan for multiple paths for availability, or do you accept a single point of failure on data/workload availability?
Redundancy: You’re hosting your service in AWS Sydney, and there’s a fire in the datacentre – what’s your failover strategy? You’ve built a whiz-bang application for your customers that relies on a back-end RDS database, and the region hosting that database starts experiencing RDS services going down. How (and to where) do you failover your database service to allow customers to keep doing what they need to do?
Recoverability: Ransomware gets into your VPC and encrypts all the data there. A developer accidentally issues a delete statement on the customer contact table within the production rather than development RDS environment. The CEO accidentally deletes critical O365 email folders. The block storage your service runs on suffers an outage and the cloud provider’s fault tolerance level was insufficient to prevent data corruption. Fault tolerance, availability and redundancy are all about avoiding as much as possible a data loss situation, but recoverability is how you handle the situation when the chips are down. Do you trust to cloud native protection, or use a mix of both? (Increasingly, mix of both is the safest, cheapest and most flexible way to go.)
- Easy 1-hour Pro Mini Classroom Datalogger [Build Update: Feb 2019] | Underwater Arduino Data Loggers
- Replacing the default (self signed) certificate on a RD Session Host server - Adrian Costea's blog
- Automating MDT Windows 10 Image Captures with Packer - WinSysBlog
- Replacing Self Signed Remote Desktop Services Certificate on Windows | Knowledge eXchange
- How to Modify Default Share Permissions and Other Tweaks • Helge Klein
- A little something about Share vs NTFS permissions
- Python, Your Friendly OSINT Helper – We are OSINTCurio.us
- Tracking All the WiFi Things – We are OSINTCurio.us
- Five Things You Can Do To Stay OSINT Curious – We are OSINTCurio.us
- Using OSINT for your personal threat model – We are OSINTCurio.us
- How to Enable Monitor Mode & Packet Injection on the Raspberry Pi « Null Byte :: WonderHowTo
- Tactical Nmap for Beginner Network Reconnaissance « Null Byte :: WonderHowTo
- Analyzing the Hacks: The Girl in the Spider's Web Explained « Null Byte :: WonderHowTo
- SSD, LVM and you: Zero data loss, LVM caching, and properly configuring your Linux box to get the most out of SSD! | The Doom'd Net
- SHA-2 patch for Windows 7 arrives on March 2019 | Born's Tech and Windows World
- How to Brute-Force Nearly Any Website Login with Hatch « Null Byte :: WonderHowTo
- How to Detect Vulnerabilities in a Web Application with Uniscan « Null Byte :: WonderHowTo
- Hubbard on Networking: AutoSSH on Odriod XU4 running Kali Linux 2
- Odriod XU4
- Hubbard on Networking: Create an HP iLo account when you don't know the Admin Password
- Hubbard on Networking: A Simple Python 3 Script for my Favorite nmap Scripts
- Hubbard on Networking: Useful Linux commands for troubleshooting WiFi
- Hubbard on Networking: Using iPerf3 to Test 2.5Gb/5Gb and 10Gb Links
- Hubbard on Networking: Update to testing 10Gb links with iPerf3
- Hubbard on Networking: Learning Python 3
- Hubbard on Networking: The tools on my Ubuntu 18.04 laptop
- Oracle Database Appliance (ODA) Installation, Configuration and Deployment Steps – Talip Hakan Ozturk's ORACLE BLOG
- Web and Podcast – We are OSINTCurio.us
- opatch lsinventory – Talip Hakan Ozturk's ORACLE BLOG
- Top 10 Things to Do After Installing Kali Linux « Null Byte :: WonderHowTo
- What’s new in ESXi 6.5 Storage Part I: UNMAP | Cody Hosterman
- Hubbard on Networking: Enabling TLS 1.1/1.2 for RDP in Microsoft Server 2008R2/Windows 7 SP1
- Setting the Standard for CVE - Lawfare
- Cimpanu: The US Govt Accountability Office recommends the US adopt GDPR-like privacy legislation @ AskWoody
- AWS Nitro System – Perspectives
- Data Breaches: What Do the Numbers Mean?
- Windows Firewall Post Exploitation with Netsh
- Upgrading / Migrating from vSphere 5.x to 6.x (6.5 , 6.7) best practices & Approach – Siva Sankar Blogs
- The Rise of the Corporate Technology Ecosystem (CTE) | Daniel Miessler
- DLA_Briefing_Template_as_of_10252017 - C151_CyberSecurity.pdf
- Brian Pippert
- SSL/TLS: How to choose your cipher suite - AMIS Oracle and Java Blog
- https://www.ryanfrantz.com/posts/when-does-an-investigation-end.html
- https://www.ryanfrantz.com/posts/architecture-reviews.html
- How to read fiction to build a startup | TechCrunch
- How to build a WiFi picture frame with a Raspberry Pi | Opensource.com
- DCOMrade - Powershell Script For Enumerating Vulnerable DCOM Applications - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- DCOMrade
- Lacking Medical Device Security Puts Everyone at Risk - Security Boulevard
- Introducing Zombie POODLE and GOLDENDOODLE
- Do You Have Security Champions in Your Company? A 6-Step Checklist for a Successful Program
- What is Security+ (Plus)? | TechRoots
- Federal PKI Security Challenges: Extending IDaaS with Certificate as a Service - Security Boulevard
- Beyond Tor: Examining the Uncharted Corners of the Dark Web - Security Boulevard
- The Costs of Cyberattacks Are Real | Radware Blog
- SSL/TLS Attacks, Part 3: Who’s at Risk from Compromised Digital Certificates? - Security Boulevard
- Zero Day Initiative — The February 2019 Security Update Review
- Windows Incident Response: Review: Tribe of Hackers
- Germany makes its cyber capabilities available for NATO allianceSecurity Affairs
- What, No Expense Account? My RSA 2019 Itinerary | Thom Langford
- Getting started with Linux Containers on Windows Server 2019 - Ben Thomas' Blog
- Update now! Microsoft and Adobe’s February 2019 Patch Tuesday is here – Naked Security
- Network Segmentation in the Zero Trust Era | Security Architects Partners
- Cyberinsurance and Acts of War - Schneier on Security
- The Complicated Economy of Open Source Software
- Step 5. Set up mobile device management: top 10 actions to secure your environment - Microsoft Secure
- Kaboom - Automatic Pentest - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- Inside a GandCrab targeted ransomware attack on a hospital – Naked Security
- A comprehensive survey on graph neural networks | the morning paper
- Poka Yoke in Manufacturing - The Automation Blog
- Notes from OWASP Helsinki chapter meeting 36 – Rule of Tech
- The 5 Most Important Typography Terms, Explained
- .NET Framework February 2019 Security and Quality Rollup | .NET Blog
- HIMSS19: The Cybersecurity Obstacles, Opportunities Ahead
- Web Scraping Boilerplate: Everything You Need to Start Your New Python Scraping Project (Batteries Included)
- NIST Risk Management Framework Webcast: A Flexible Methodology to Manage Information Security and Privacy Risk | NIST
- How to improve your cyber resilience - IT Governance Blog
- Tech Refresh as Part of an Effective Vulnerability Management Program: Part Two - Delta Risk
- What CEOs Need to Know About the Future of Cybersecurity
- Toyota Prepping 'PASTA' for its GitHub Debut
- PASTA (Portable Automotive Security Testbed with Adaptability)
- Lessons Learned from a Hard-Hitting Security Review
- Jaspreet Singh
- Securing Clients SAP S4HANA Netweaver ABAP | Onapsis
- Getting PowerShell Empire Past Windows Defender - Black Hills Information Security
- Microsoft updates its schedule for SHA-2 ‘critical’ Win7 update, now due in March @ AskWoody
- ESXi: Slow Disk Performance on HPE Gen8 | Windows OS Hub
- AMP RJ-45 vs WE/SS (Regular) RJ-45 Plugs | Matt's Tech Pages
- Blockchain and Trust - Schneier on Security
- How To Migrate Shares and Files with ease by using Microsoft Storage Migration Service | ESX Virtualization
- Top 10 Critical Skills Every vSphere System Administrator Should Know
- ipmitool | panticz.de
- Load Testing Web Servers with Siege Benchmarking Tool
- Three stages of risk-based vulnerability management: Crawl, Walk, Run
- OpenJDK projects you should know about - Panama
- The Final Version of the EU's Copyright Directive Is the Worst One Yet | Electronic Frontier Foundation
- Programming Management & Leadership Books | b3n.org
- APM in a Digital World - Part 3 | APMdigest - Application Performance Management
- Microsoft Patchday: Other Updates February 12, 2019 | Born's Tech and Windows World
- APM in a Digital World - Part 2 | APMdigest - Application Performance Management
- APM in a Digital World - Part 1 | APMdigest - Application Performance Management
- 19c – Laurent Schneider
- Jaffar's (Mr RAC) Oracle blog: Oracle 19c and my favorite list
- Installing and running Oracle Database 19.2.0.0 on Oracle Linux 7 - DBA - Rodrigo Jorge - Oracle Tips and Guides
- It's now 2019, and your Windows DHCP server can be pwned by a packet, IE and Edge by a webpage, and so on • The Register
- Performance Tuning Dojo » ADMIN Magazine
- Cybersecurity Documentation: The Best Defense Is a Good Offense
- The Business of Organised Cybercrime - Security Boulevard
- Save and Invest | Investor.gov
- Five Convergence Solutions to Help Manufacturing Cross the IT-OT Security Schism
- Owning Your Legal Practice's Cybersecurity – MSPs and You
- Enhancing cyber threat protection in Microsoft Office 365 - Security Boulevard
- Why True End-To-End Encryption is Important for Distributed Apps - Security Boulevard
- 2019's Hottest, and Most Bankable, Security Certs - Security Boulevard %
- Five Major Cloud Security Roadblocks and Their Impact on the Enterprise - Security Boulevard
- Introduction to WiFi Security - Security Boulevard
- Quickly Gauge Your Serverless Security Readiness With This Short Quiz
- The Cyber-Risk Paradox: Benefits of New Technologies Bring Hidden Security Risks - Security Boulevard
- Microsoft Patch Tuesday updates for February 2019 fixes IE Zero-DaySecurity Affairs
- Cloud, On-Premises, or Hybrid – What Is the Best HSM Solution for You? - Security Boulevard
- “It is everyone’s business and responsibility” – 40+ Cybersecurity Professionals Share What They Wish Business Leaders Would Understand in Their Own Words - Security Boulevard
- Kubernetes Security Best Practices: From Hosting to Deployment
- Health Data Security: The Most Promising Technologies
- Ron Mehring
- Assessing IoT Risks in Healthcare Environments
- Julia Hesse
- Solving the TLS 1.0 Problem - Security documentation | Microsoft Docs
- Devastating Cyberattack on Email Provider Destroys ...
- Microsoft rolls out healthcare-focused chat features and AI assistants | FierceBiotech
- HIPAA Enforcement Update: Areas of Focus - HealthcareInfoSecurity
- Medical Device Cyber Risk: An Enterprise Problem
- CynergisTek
- Japan Security Analyst Conference 2019 -Part 1- - JPCERT/CC Eyes | JPCERT Coordination Center official Blog
- HIMSS19 ~ Cyber Thoughts
- Who’s Responsible for Your Cyber-Security?
- How to Keep Your Kids Safe on the Internet (10 Actionable Tips)
- No left boundary for Vulnerability Detection | Alexander V. Leonov
- Use Group Policy To Manage Settings for Store Apps | Alexander's Blog
- Unexpected Microphone and Camera Behavior in Windows 10 Settings | Alexander's Blog
- Enterprise IT Moving More Workloads to Cloud in 2019 | APMdigest - Application Performance Management
- Copying Large Files over an Unreliable Network Using BITS and PowerShell | Windows OS Hub
- Integrating Windows Updates into Windows 10 Install Image | Windows OS Hub
- Work Optional by Tanja Hester: An honest review
- Using Azure Site Recovery for Migrations (Part 2) | PeteNetLive
- Using Azure Site Recovery for Migrations | PeteNetLive
- Remove unknown VM image from ESXi |
- Chris's Wiki :: blog/unix/GrepDevNull
- Microsoft analysis: 0-day vulnerabilities the biggest risk | Born's Tech and Windows World
- Patchday: Updates for Windows 7/8.1/Server Feb. 12, 2019 | Born's Tech and Windows World
- 500px reveals 2018 breach that exposed user data
- What's the right amount of swap space for a modern Linux system? | Opensource.com
- Hacking an Oracle Database and How to Prevent It | Integrigy
- oss-sec: CVE-2019-5736: runc container breakout (all versions)
- SS7 Cellular Network Flaw Nobody Wants To Fix Now Being Exploited To Drain Bank Accounts | Techdirt
- Gain Valuable Kubernetes Skills and Certification with Linux Foundation Training | Linux.com | The source for Linux information
- Protecting the Logical Security of a Network Environment - InCyberDefense
- Multiple Factors Are Driving Growth at the CNCF
- One in six American adults now wear a computer on their wrist
- Terence Luk: Using InstallSoftwareRemotely.ps1 to upgrade VMware Horizon View Agent
- InstallSoftwareRemotely.ps1
- Document: Executive Order on Artificial Intelligence - Lawfare
- GDPR: Do your backups spark joy? | Data Protection: Avamar, NetWorker, Data Domain, RecoverPoint, CSM
- Veterans can access their medical info through Apple's Health Records
- Linked - New Research Reveals 6 Ways Leaders May Be Out of Touch With Their Employees
- Lawyers and Cybersecurity in 2019: Trends and Tips - MyCase Blog
- What Is Web Scraping? How to Collect Data From Websites
- Service Fabric Customer Architecture: ZEISS Group – AzureCAT Guidance
- SQL Mysteries: SQL Server Login Timeouts – A Debugging Story – SQL Server According to Bob
- Five lessons we learnt about GDPR in 2018 - Security Boulevard
- A Cybersecurity and Cloud Innovator – and a Great Partner - Security Boulevard
- 15 Hacker Types – The Good, the Bad and the Ugly
- Ransomware Evolution: GandCrab v5.1 New Exploit Kit Distribution and TOR Site Features - Security Boulevard
- Ohio Senate Bill 220 Incentivizes Businesses to Maintain Higher Levels of Cybersecurity - Security Boulevard
- The Perfect Sales Kickoff - Security Boulevard
- How Panorays is Different Than Other Third-Party Risk Management Solutions - Security Boulevard
- Panorays
- The 3 Pillars of the Modern-Day SOC - Security Boulevard
- Customers Blame Companies not Hackers for Data Breaches - Security Boulevard
- Immunizing Your Healthcare Technology Against Cybersecurity Threats - Security Boulevard
- Simplifying Cybersecurity Deployments with Automation - Security Boulevard
- B 00 Doesnt It make You WannaCry Mitigating Ransomware on a Windows Network David Branscome - YouTube
- The Cybersecurity Skills Gap: The Defining Skills Shortage of Our Age - Security Boulevard
- Cloud security infographic: The Facts | Intercity Technology
- How to Monitor File Changes across Windows Servers - Security Boulevard
- Quick Hit: Speeding Up a Slow/Mundane Task with a Little Rcpp | rud.is
- EdGuards - Security for Education
- SSL Attacks, Part 2: Where Can Cybercriminals Access Digital Certificates? | Venafi
- SSL Attacks, Part 1: Why Do Cybercriminals Abuse Digital Certificates? | Venafi
- A Revolutionary Approach to HIPAA Compliance - Security Boulevard
- HIMSS 2019 – Champions of Security Unite – Professionally Evil Insights
- iOS 12.1.4 Patches Three Major Flaws | Avast - Security Boulevard
- Whiskey | Daniel Miessler
- To Understand IoT Security: Look to the Clouds - Security Boulevard
- nDPI - Open Source Deep Packet Inspection Software Toolkit - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- Microsoft will make Office Pro Plus GDPR compliant | Born's Tech and Windows World
- 'Grandmother Hypothesis' May Help Explain Why Women Live Past Menopause : Goats and Soda : NPR
- SQL Server Worker Thread Default Calculation – SQL Server According to Bob
- 7 Critical Job Application Mistakes to Avoid (Especially for New Graduates)
- The Best Portable Apps That Require No Installation
- Demystifying Stripe Width in vSAN — ThinkCharles.net
- Tips for writing Vester test files, part 1 | Adventures in a Virtual World
- OpenJDK projects you should know about: Valhalla
- SpeakUp Linux Backdoor targets Linux servers in East Asia and LATAM.Security Affairs
- Reverse RDP Attack - Rogue RDP Server can be used to hack RDP clientsSecurity Affairs
- Data breaches, GDPR lead 54% of companies to increase IT security spending - TechRepublic
- Business continuity in ISMS? - Security Art Work
- InfoSec Handlers Diary Blog - Struts Vulnerability CVE-2017-5638 on VMware vCenter - the Gift that Keeps on Giving
- InfoSec Handlers Diary Blog - UAC is not all that bad really
- Spy Versus Spy: How a Researcher And a Journalist Unmasked an Undercover Agent - Motherboard
- Michael on Security: March Updates on Frameworks & Standards
- Ransomware Victims Who Pay Cough Up $6,733 (on Average)
- Health Data Breach Tally: What’s New? - HealthcareInfoSecurity
- Susan Lucci
- Settlement Reached in Community Health Systems Breach Suit
- HIMSS19: Cybersecurity in the Spotlight - HealthcareInfoSecurity
- EHR Vendor Greenway Gets Hefty Fine for False Claims
- Bolstering the Cybersecurity of Medical Devices
- Chaitanya Srinivasamurthy
- Cottage Health Hit With $3 Million HIPAA Settlement
- Securities Fraud Claims Get Boost From EU Data Privacy Rules
- Let’s talk about IoT device security | NIST
- Wyoming Seeks to Repeal Hospital Privacy Regulation for HIPAA Clarity
- Fnord - Pattern Extractor For Obfuscated Code - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- Bincat - Binary Code Static Analyser, With IDA Integration - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- Small and Medium Business Security Strategies: Part 5 - Black Hills Information Security
- Small and Medium Business Security Strategies: Part 4 - Black Hills Information Security
- Small and Medium Business Security Strategies: Part 3 - Black Hills Information Security
- Small and Medium Business Security Strategies: Part 2 - Black Hills Information Security
- Small and Medium Business Security Strategies: Part 1 - Black Hills Information Security
- Investigate Suspicious Account Behaviour Using SysmonSearch - JPCERT/CC Eyes | JPCERT Coordination Center official Blog
- Introducing WMIOps - Christopher Truncer's Website
- Make the Time to Fix Your Time Debt | Hackaday
- DSHR's Blog: Cloud For Preservation
- [career] Navigating Your Career | Don Jones®
- Digital Transformation Efforts Hindered by Lack of Collaboration Between IT and Business | APMdigest - Application Performance Management
- Essential System Tools: f3 - detect and fix counterfeit flash storage - LinuxLinks
- Docker - Basics just for me | itsec.siers.ch
- Reusing DHCP config in ISC dhcpd | Lesser-Evil
- Kubernetes - Namespaces - The IT Hollow
- Firing people is always a last resort. | The IT Skeptic
- AD Controls [SHIFT]
- Upgrade a Standalone ESXi Host to ESXi 6.7
- Taking the Azure Data Box Gateway (preview) out for a spin! – Karim Vaes
- 30 Things to Get You Started - Black Hills Information Security
- EyeWitness and Why It Rocks - Black Hills Information Security
- DFIRTrack - The Incident Response Tracking Application - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- GitHub - FortyNorthSecurity/EyeWitness: EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.
- Goscan - Interactive Network Scanner - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- RedELK - Easy Deployable Tool For Red Teams Used For Tracking And Alarming About Blue Team Activities As Well As Better Usability In Long Term Operations - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- CANalyzat0r - Security Analysis Toolkit For Proprietary Car Protocols - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- Volatility Workbench - A GUI For Volatility Memory Forensics - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- Everything you need to know about DPOs under the GDPR - IT Governance Blog
- Bypass Application Whitelisting using Weak Path Rule
- The IT Governance Cyber Resilience Framework: how it works - IT Governance Blog
- Transform your security posture with cyber resilience - IT Governance Blog
- Google Online Security Blog: Open sourcing ClusterFuzz
- New Zombie 'POODLE' Attack Bred From TLS Flaw
- Mitigation upgrade to TLS v1.3
- Australian Parliament Reports Cyberattack on Its Computer Network - The New York Times
- Ransomware Attack Via MSP Locks Customers Out of ...
- Cyber risk management: The disconnect between business, security teams | CSO Online
- David A. Wheeler's Blog
- Certifications Are About Support | The Networking Nerd
- Cisco - Linux - Python: MainPage
- Design for security [LWN.net]
- Dstat - A Resourceful Tool to Monitor Linux Server Performance in Real-Time
- Ansible and FreeIPA Part 2 | Adam Young’s Web Log
- Ansible and FreeIPA Part-1 | Adam Young’s Web Log
- Containers: The Basics - Linux Academy Blog
- ZFS Boot Environments Are Helping To Improve The Resilience Of FreeBSD Upgrades - Phoronix
- Remote Desktop Protocol Riddled With 16 Major Vulnerabilities
- Microsoft and Open Source RDP Clients Are Vulnerable to System Takeover Attacks - WinBuzzer
- Top Hex Editors for Linux
- Disk Encryption for Low-End Hardware | Linux Journal
- A Moment of Truth for Cyber Insurance - Lawfare
- The Funniest Incident Postmortem | Gluster
- A review of all the calendar options in SharePoint and Office 365 - SharePoint Maven
- Successful Founders Share Their Advice for Starting Your Own Business
- Asylo
- 7 Tips For Communicating With the Board
- Report: Over 59,000 GDPR data breach notifications, but only 91 fines | CSO Online
- Open Source LIDAR Lets You Get Down To The Nitty Gritty | Hackaday
- NetLogo for scientific research: Modeling | Opensource.com
- Ubiquiti Discovery Service Exposures Allowing DoS Attacks Explained
- Enterprises Move (Slowly) Toward Stronger Cybersecurity, Research Shows
- Your Money or Your Life - An Interview with Author Vicki Robin | Mad Fientist
- Multiple Ways to Exploiting Windows PC using PowerShell Empire
- New Vulnerabilities Make RDP Risks Far From Remote
- Over 59K Data Breaches Reported in EU Under GDPR
- How to Access the Dark Web Safely and Anonymously
- Information Security | Daniel Miessler
- Ransomware Evolution: GandCrab v5.1 New Exploit Kit Distribution and TOR Site Features
- GandCrab v5.1
- How ADP identifies and reduces third-party risk | CSO Online
- Hard days at work - SysAdmin1138 Expounds
- Julia Reda – Article 13 is back on – and it got worse, not better
- Self-charging pacemakers are powered by patients' heartbeats
- ‘Achieving and Maintaining Cyberspace Superiority’: A Cyber Command and Interagency Legal Conference - Lawfare
- Password Reuse Remains a Barrier to Safer Internet Use, Google Reports
- 5 reasons why you need to embrace Microsoft Flow - SharePoint Maven
- Costs for Windows 7 Extended Security Updates till 2023 | Born's Tech and Windows World
- Windows 10: Microcode Updates February 2019 | Born's Tech and Windows World
- Planning for the future isn't what it used to be | Opensource.com
- UNIX: Building The Most Important OS in the World
- The Mayo Clinic created an online tool for predicting kidney stones
- Developing an Objective, Repeatable Scoring System for a Vulnerability Equities Process - Lawfare
- Big-O Notation Explained | Daniel Miessler
- Michael on Security: Security Maturity Models (Part 1 of 2)
- Avoid these Common Security Misconfigurations - Security Boulevard
- Building a Disk Tower, for all pain and no profit
- BestDuplicator
- Let's Play with Routing - Part 1
- A New Switch for a New Day
- Fwknop - Single Packet Authorization & Port Knocking - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- The Mega-Guide to Trends in 2019 – J.D. Meier's Blog
- Parsing Text with PowerShell (3/3) | PowerShell Team Blog
- oVirt: Open Source Virtualization for the datacenter – Marksei
- What Is a VPN Connection and How Does It Work?
- Now That’s What I Call Crypto: 10 Years of The Best of Bitcoin | Hackaday
- Organize tool box drawers cheap - The Silicon Underground
- How bad is MS08-067? - The Silicon Underground
- MS08-067
- Linux Fu: Easier File Watching | Hackaday
- Hack Your File Hierarchy with Johnny Decimal System (Dewey’s Older Brother) | Hackaday
- The elements of cybersecurity hygiene and secure networks - Part 3
- CISOs must change their outlook or lose their jobs
- “AaronLocker” moved to GitHub – Aaron Margosis' Non-Admin, App-Compat and Sysinternals WebLog
- The case for building expertise to work on US AI policy, and how to do it - 80,000 Hours
- Out-of-Office Messages are a Security Risk - The Lone Sysadmin
- Monitoring Citrix - a vendor overview -
- Configure SCCM Maintenance Windows based on Patch Tuesday
- Automating my TV – Scott Gruby's Blog
- Adding Energy Monitoring to Home Assistant – Scott Gruby's Blog
- Hyper-V VM configuration version supported features - Thomas Maurer
- Cool feature in SMS Trace (Trace32.exe) | 9to5IT
- Thoughts on Azure, OMS & SCOM: Digging through log files? SMS Trace is the way to go!
- WSUS Windows Update Error 0x80244010: Exceeded max server round trips | Windows OS Hub
- 0x80244010
- Ubuntu 18.10 install notes | Nelson's log
- Running Systems » Blog Archive » HA ZFS NFS Storage
- Zero Day Initiative — Of ISOs and Attorneys: Legal Action in Vulnerability Disclosure
- Windows Incident Response: RegRipper
- Building a Cybersecurity Talent Pipeline One Coding Challenge at a Time | Webroot
- Compliance Beyond IRS 1075 and CJIS Audits - Blog | Tenable®
- IRS1075
CJIS
- Cyber (GRU) (II): historical SIGINT - Security Art Work
- Great reference list.
- Aztarna - the open-source scanning tool for vulnerable robotsSecurity Affairs
- Aztarna
- Reading the ENISA Threat Landscape Report 2018Security Affairs
- Can Enterprises execute a GRC Movement?Security Affairs
- Step 4. Set conditional access policies: top 10 actions to secure your environment - Microsoft Secure
- Debbie Seres
- CISO series: Talking cybersecurity with the board of directors - Microsoft Secure
- ADAPT - Tool That Performs Automated Penetration Testing For WebApps - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- CIRTKit - Tools For The Computer Incident Response Team - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- CIRTKit
- Uncle Spufus - A Tool That Automates Mac Address Spoofing - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- Pown Recon - A Powerful Target Reconnaissance Framework Powered By Graph Theory - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- LOLBAS - Living Off The Land Binaries And Scripts (LOLBins And LOLScripts) - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- LOLBAS
- List of data breaches and cyber attacks in January 2019 - 1,769,185,063 records leaked - IT Governance Blog
- A 6-step guide to surviving data breaches - IT Governance Blog
- Infosecurity.US - Web Log - OWASP Top Ten IoT 2018
- OWASP: What Are the Top 10 Threats and Why Does It Matter?
- Privacy: Several States Consider New Laws - HealthcareInfoSecurity
- Inside Matrix and Emotet: How They Work, and How to Defend
- New Medical Device Cybersecurity Framework Unveiled
- Kevin McDonald
- Government Spending on Cybersecurity: An Analysis
- Alia Mendonsa
- A CISO on the Value of Endpoint Detection and Response
- Larry Whiteside
- Jenkins Pentest Lab Setup
- xDedic - Marketplace for Hacked RDP Credentials is Taken Down
- Vulnerability Life Cycle and Vulnerability Disclosures | Alexander V. Leonov
- What’s wrong with the Raspberry Pi – Own your bits
- Installing and setting-up JAVA & JBoss 7 Final on CentOS 6 | RoseHosting
- Hardening your HTTP response headers
- How to Mitigate the Java Deserialization Vulnerability in JBoss Application Servers | Synopsys
- The Bash Fingertips: Making Your Own 'Information Centre' | Tux Machines
- Java servers like Jetty, GlassFish and Tomcat | NGINX
- Using ngnix with WildFly - JBoss
- 5 Best Python Frameworks for WebView Testing | Codementor
- Build a network emulator using Libvirt | Open-Source Routing and Network Simulation
- How to Enable Android Enterprise and configure Personal devices with a Work Profile in Microsoft Intune – The ultimate Step-By-Step Guide
- How to Use Docker Containers - Make Tech Easier
- Cornelius' Blog: Governance on demand
- FOSS Project Spotlight: Mender.io, an Open-Source Over-the-Air Software Update Manager for IoT Devices | Linux Journal
- SSL and Weblogic - Remote PSAdmin
- Product Lifecycle Management in the Medical Device Industry - White Paper - lifecycle-mgmt-medical-device-bwp-070013.pdf
- UD_Cybersecurity-Healthcare-2018-conference-agenda.pdf
- Open redirects - the vulnerability class no one but attackers cares about - Steve Tabernacle
- Advisories | CERT NZ
- GitHub - Vulnerator/Vulnerator: The official distribution of the vulnerability parsing utility.
- Let’s Encrypt when your server is behind a firewall and you can’t use DNS Challenge – Diary of an Emacs tragic
- Should There Be More School Policies on Teachers' Social Media Interaction With Students? - Law and Daily Life
- Looking Ahead To 2019 | The Frog Pond of Technology
- How long will Oracle Database 12.2 be supported?
- Dissecting 190115 BP, PSU, RU and RUR - DBA - Rodrigo Jorge - Oracle Tips and Guides
- Azure Automation of A-to-Z, Part I – DBAKevlar
- A Collection of Useful Resources for Web Designers and Programmers
- Data Privacy Year | Linux Journal
- Using EFI/UEFI firmware in a VMware Virtual Mac... |VMware Communities
- Dump LAPS passwords with ldapsearch ·
- Searching LDAP using Nmap’s ldap-search.nse script | Faded Lab
- CA Spectrum Common Access Card Authentication Solution Guide - Spectrum_CAC_Authentication_Guide_ENU.pdf
- DoD CAC Reader | Ubuntu, Derivatives and Linux Mint – CubicleNate's Techpad
- Local Admin Access and Group Policy Don’t Mix - TrustedSec
- Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil …
- Centrify Now Offers Free US Government PIV and Military CAC Support for the Mac | Secure Thinking by Centrify
- CAC Card for DOD/Military : Fedora
- The Risky Business of Cybersecurity
- Connectivity Problems Caused by Issues in SQL Server – SQL Meditation
- Up, up and to the Clouds: Cloud Computing 101 - Security Boulevard
- Parsing Text with PowerShell (2/3) | PowerShell Team Blog
- Parsing Text with PowerShell (1/3) | PowerShell Team Blog
- Migrate a VM from vCenter to Azure | PeteNetLive
- Programming paradigms for dummies: what every programmer should know | the morning paper
- Top 30 Data Recovery Interview Questions and Answers for 2019
- Demystifying the Indian Data Protection Bill, 2018: Part 2 of 3 - Gemalto blog
- Demystifying the India Data Protection Bill, 2018: Part 1 of 3 - Gemalto blog
- New Phobos Ransomware Using Same Ransom Note as Dharma - Security Boulevard
- What Are Common Certificate Validation Flaws? - Security Boulevard
- CVSS: Characterizing and Scoring Vulnerabilities - Security Boulevard
- Benefits of SSH Key Management - Security Boulevard
- Open Source Licenses Explained - Security Boulevard
- The Evolution of Darknets - Security Boulevard
- Healthcare: A Cloud Security Investigation (CSI) - Security Boulevard
- CISO Intro by Jeremiah Grossman - Security Boulevard
- “Cyber Smart” Interview with Bart McDonough - Security Boulevard
- Continuous Monitoring 101
- How To Install and Use RetroArch on Linux - LinuxConfig.org
- Roles and Responsibilities of the Information Security Manager - Security Boulevard
- Windows Registry & Osquery: The Easy Way to Ensure Users are Secured - Security Boulevard
- Serverless And The Evolution In Cloud Security, How FaaS Differs From IaaS - Security Boulevard
- SAP Security Notes 2018: Lessons Learned and a Look to What's Ahead in 2019 - Security Boulevard
- FTW - Framework For Testing WAFs - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- Build Cheat Sheets and Share Your Favourites! - Cheatography.com: Cheat Sheets For Every Occasion
- 10 YouTube URL Tricks You Should Know About
- Howto: Docker, Databases, and Dashboards to Deal with Your Data | Hackaday
- Container Jungle: where do I start? Docker, Kubernetes – Marksei
- Ansible, ARA and MariaDB (or MySQL) – The ongoing struggle
- Illinois biometric privacy law passes a key court test
- VIRTIO 1.1 Standard Moving Closer To Release With GPU Device, Better Performance - Phoronix
- DeployHappiness | Master of Science in IT: 1 Year, $5200
- Benchmarking The Current Spectre + Meltdown Performance Overhead For 10 GbE Networking - Phoronix
- Consumer threats down as cybercriminals target business
- Poor integration costs businesses $500,000 a year
- Chris's Wiki :: blog/linux/ServerRebootOnPanics
- Getting Started with Kubernetes - The IT Hollow
- Office 365 down (January 24, 2019)? | Born's Tech and Windows World
- Planner Notifications for Teams – All About I.T.
- Digital IDs said to boost economies, but privacy is at risk - Japan Today
- Prudent Security Admin: Has a New Data Breach Precedent Been Created? - Security Boulevard
- How to Become a Chief Information Security Officer — CyberSpeak Podcast - Security Boulevard
- Study: Hospitals dramatically increase ad spend following data breaches - Security Boulevard
- 5 Ways a CISO Can Tackle the CyberSecurity Skills Shortage Now - Security Boulevard
- 1. Lower the Skill Level
2. Spread the Load For Your Security Professionals
3. Raise Awareness About Cyber Attacks
4. Increase Network Visibility
5. Plan for Tomorrow
- NBlog - the NoticeBored blog: NBlog Jan 23 - infosec policies rarer than breaches
- NBlog - the NoticeBored blog: NBlog Jan 25 - cyber risks in context
- State agency exposes 3TB of data, including FBI info and remote logins – Naked Security
- 2 distinct campaigns delivered GandCrab ransomware and Ursnif TrojanSecurity Affairs
- Collection #1 Data Breach Analysis – Part 2 - by Marco RamilliSecurity Affairs
- “Collection #I” Data Breach Analysis – Part 1 – Marco Ramilli Web Corner
- Jok3R - Network And Web Pentest Framework - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- Voice of the Customer: Azure AD helps lululemon enable productivity and security all at once for its employees - Microsoft Secure
- Conpot - An Open Industrial Control Honeypot - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- Beebug - A Tool For Checking Exploitability - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- Fighting Emotet: lessons from the front line – Naked Security
- The Application Security Team's Framework For Upgrading Legacy Applications
- Sh00T - A Testing Environment for Manual Security Testers - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- What is an ISMS and 8 reasons why you should implement one - IT Governance Blog
- The PCI SSC’s new software security standards – what you need to know - IT Governance Blog
- PCI SSC
- On the 'structural shortcomings' of the GDPR
- Study: Companies with GDPR investments conduct business faster
- Girl Scouts announce new cybersecurity patch
- 5 Malware Trends: Emotet Is Hot, Cryptominers Decline
- Hardware Hacking 101 – Lesson 1: Beauty, Your Home Lab and Basic Electronics - The Ethical Hacker Network
- Government Shutdown: Impact on Health Data Security, Privacy
- Colorado police encrypt *all* their radio communications, frustrating journalists
- Life Under GDPR: Data Breach Cost Unknown - HealthcareInfoSecurity
- Dharma Gang Pushes Phobos Crypto-Locking Ransomware
- Coveware's 2018 Q4 Ransomware Marketplace Report
- Google Hit With $57 Million GDPR Fine in France
- National Data Privacy Day Is Wishful Thinking
- Center for Internet Security releases Microsoft 365 benchmarks | CSO Online
- Looping sssd_nss - Blog dbi services
- VMware Snapshots: Securing Windows RDP Connections with a Signed SSL Certificate
- Landscaping a Secure/Closed Loop Infrastructure in Azure with Terraform & Azure Devops – Karim Vaes
- New – TLS Termination for Network Load Balancers | AWS News Blog
- Home - Freeplane - free mind mapping and knowledge management software
- Top 11 Free Linux DICOM Viewers for Doctors
- Understanding Bash fork() Bomb :(){ :|:& };: code - nixCraft
- GandCrab ransomware and Ursnif virus spreading via MS Word macros
- GandCrab
- Debian GNU/Linux 9.7 "Stretch" Released with Patched APT Package Manager
- Gulp - A Toolkit for Automating Painful Tasks in Development
- Top 5 Vulnerability Scanning Tools – Linux Hint
- Best 10 Free and Open Source Lab Management Systems
- Get started with LogicalDOC, an open source document management system | Opensource.com
- Beware! This Malicious Ransomware Hides As Free Games & Software
- Forget No-Carb. Embrace Slow Carb : The Salt : NPR
- Buddha Bowl - Make Your Own Bowl for any Phase - Chef Dawn Ludwig
- KookBook 0.2.0 available – now manage your cooking recipes better – Blog :: Sune Vuorela
- To upgrade or not to upgrade? That's the question! | The ORACLE-BASE Blog
- Vulnerabilities Found in Highly Popular Firmware for WiFi Chips
- New Android Malware Uses Motion Sensors To Stay Hidden
- The 7 Habits of Highly Effective IT Leaders – J.D. Meier's Blog
- Corporate Best Practices in Security Awareness and Training Programs
- Dan Lohrmann
- The Start of the RHCA Journey | Lisenet.com :: Linux | Security | Networking
- Guinness World Records bets on Office 365 and AWS to boost business expansion
- “It is the IT department’s job to make sure we can respond to the ever-growing changes within our business model, so we can take up new opportunities and move into new markets,” says Rob Howe, IT director at Guinness World Records.
- How to inject custom drivers into an ESXi 4.1 image using vibddi?
- An AnandTech Exclusive: The Jim Keller Interview
- SC Cyber
- 8 Awesome InfoSec and Cybersecurity Blogs of 2018 -
- GitHub - paralax/awesome-cybersecurity-internships: a list of cybersecurity internships
- GitHub - jivoi/awesome-ml-for-cybersecurity: Machine Learning for Cyber Security
- Greek Gluten Free Meatloaf Muffins | Healthy & Easy Freezer Meals
- nVisium
- xsstrike.tk
- GitHub - s0md3v/XSStrike: Most advanced XSS detection suite.
- GitHub - l0ss/Grouper: A PowerShell script for helping to find vulnerable settings in AD Group Policy.
- GitHub - minimaxir/big-list-of-naughty-strings: The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data.
- Introducing Metta: Uber’s Open Source Tool for Adversarial Simulation
- Xeneta | Ocean Freight Rate Benchmarking Platform
- The State of AI for Sales Enablement, and the Evolution of the CRM | Emerj - Artificial Intelligence Research and Insight
- How To - Use VMware vSphere PowerCLI to patch hosts | 9to5IT
- How to Install latest ESXi VMware Patch - [Guide] | ESX Virtualization
- How to Write a Business Case ― 4 Steps to a Perfect Business Case Template | Workfront
- Security-related Rules
- New cybersecurity guidelines for medical devices | Vantage Asia
- How to Justify a Software Purchase — Step by Step
- SupplyChainBrain - The world's most comprehensive supply chain management information resource.
- Troubleshooting remote syslog reachability · Papertrail log management
- GitHub - trimstray/test-your-sysadmin-skills: A collection of *nix Sysadmin Test Questions and Answers. Test your knowledge and skills in different fields with these Q/A.
- Solaris : How to start syslogd in debug mode – The Geek Diary
- Topic: Cybersecurity - ABA Journal
- How To Centralize Logs with Rsyslog, Logstash, and Elasticsearch on Ubuntu 14.04 | DigitalOcean
- Centralised logging with Rsyslog and Microsoft Azure - Part 1
- x265 transcoding | Nelson's log
- So You Automated Your Coworkers Out of a Job
- OSINT Resources for 2019 – Steve Micallef – Medium
- A Review of my Bug Hunting Journey - My Learning Journey
- HOWTO: Build a Temperature Alert System using a Raspberry Pi – Please Work
- What version of SQL Server do I have? | Mohammed Wasay
- List Domain Admins & Enterprise Admins in a domain | Mohammed Wasay
- Get the list of domain admins and check if they are enabled.
Get-ADGroupMember -Identity "Domain Admins" -Recursive | %{Get-ADUser -Identity $_.distinguishedName} | Select Name, Enabled
1
Get-ADGroupMember -Identity "Domain Admins" -Recursive | %{Get-ADUser -Identity $_.distinguishedName} | Select Name, Enabled
Get the list of enterprise admins and check if they are enabled.
Get-ADGroupMember -Identity "Enterprise Admins" -Recursive | %{Get-ADUser -Identity $_.distinguishedName} | Select Name, Enabled
1
Get-ADGroupMember -Identity "Enterprise Admins" -Recursive | %{Get-ADUser -Identity $_.distinguishedName} | Select Name, Enabled
- Create incremental OVA images using Packer
- Peter Gutmann's Home Page
- Peter Gutmann
- Blue Team Architecture and Analysis - Part 3, Coverage Assessment Map by J Geno - tool, knowledge, procedures
- Blue Team Architecture and Analysis - Part 2, Guide to the Part 1 Document by J Geno - engineering, management, data breaches
- Blue Team Architecture and Analysis - Part 1 by J Geno - time, business, goals
- PowerPoint Creating Conference Posters.pdf - Course_Book_Ppt_TIUD_Conference_Posters10.pdf
- All of Windows Cipher Suites | Mohammed Wasay
- Windows (10 & 2016) Build 1709 & 1803 cannot connect to SMB Shares | Mohammed Wasay
- Oracle to charge for Java Updates & how you can disable them | Mohammed Wasay
- Convert a Dynamic IP to Static | Mohammed Wasay
- Expedition ML4SEC Part - 1: Introduction to machine learning for security professionals - payatu
- Presentations: Billboard science : Naturejobs
- Turning your BMC into a revolving door - zeronights_2018_turning_your_bmc_into_a_revolving_door.pdf
- IoT Security – Part 4 (Bluetooth Low Energy - 101) - payatu
- IoT Security – Part 3 (101 - IoT Top Ten Vulnerabilities) - payatu
- Blog Archives - Page 3 of 4 - payatu
- IoT Security – Part 2 (101 - IoT Attack surface) - payatu
- IoT Security – Part 1 (101 - IoT Introduction and Architecture) - payatu
- RedTeaming from Zero to One - Part 2 - payatu
- RedTeaming from Zero to One - Part 1 - payatu
- Don’t Become a Ransomware Target
- Using Packer to Automate vSphere Template Builds
- Exploiting JNDI Injections in Java | Veracode blog
- vCloudNotes : Information Sharing: How to capture memory dump of a VM from snapshot or suspended state file
- Trusted Ransomware Removal And Data Recovery Experts
- Security Checklist
- North Korean hackers infiltrate Chile's ATM network after Skype job interview | ZDNet
- vCloudNotes : Information Sharing: Intel / AMD processor vulnerability: Meltdown-Spectre and VMware Esxi
- vCloudNotes : Information Sharing: How to reset iLO login password from within ESXi Shell
- Installing the Home Lab – Installing vCenter 5.5 on Windows 2012R2 – Everything-Virtual
- vCloudNotes : Information Sharing: How to Check, Start, Stop or Restart Windows version of vCenter 6.x Services
- HxD - Freeware Hex Editor and Disk Editor | mh-nexus
- Check with Powershell for Meltdown and Spectre #exploit critical vulnerabilities Protection #Meltdown #Spectre #KB4056892 | Robert Smit MVP Blog
- DevopsWiki/README.md at master · Leo-G/DevopsWiki · GitHub
- GitHub - ANSSI-FR/audit-radius: A RADIUS authentication server audit tool
- How to choose the correct Garbage Collector? Java Generational Heap and Garbage Collection explained - Karunsubramanian.com
- What you didn't know about java.lang.OutOfMemory Error! - Karunsubramanian.com
- Why is there a discrepancy between Windows Task manager Memory and Java Heap ? - Karunsubramanian.com
- Building vSphere Templates From Scratch Using Packer and the vSphere API – Green Reed Technology
- Windows 10 and reserved storage | Storage at Microsoft
- History · bibanon/bibanon Wiki · GitHub
- A huge list of Windows log file Event IDs for detecting lateral movement by S. Delano - development, python, script
- Detecting Lateral Movement through Tracking Event Logs
- Raspberrypi as poor man's hardware hacking tool - payatu
- Linux Security Hardening with OpenSCAP and Ansible – clasohm.com
- Splunk vs ELK - Karunsubramanian.com
- What is Docker? An absolute beginner's guide - Karunsubramanian.com
- Unable to Connect RDP: CredSSP Encryption Oracle Remediation | Windows OS Hub
- What is SYN_SENT socket status? - Karunsubramanian.com
- Windows XP Can’t RDP to Windows 10 / Server 2012R2/2016 RDS | Windows OS Hub
- Get Reverse-shell via Windows one-liner
- “Collection #1” Data Breach Analysis – Part 1 - Security AffairsSecurity Affairs
- How running websites has changed in the last two decades (for an Ars IT guru) | Ars Technica
- Fecebook Could Be Slapped With 'Record-Setting' Fine By FTC
- 7 Common Email Security Protocols Explained
- Facebook violated tough new cybersecurity law, says Vietnam – Naked Security
- DevOps and Culture, part 2 – Premier Developer
- DevOps and Culture, part 1 – Premier Developer
- UPnP, Vulnerability As A Feature That Just Won’t Die | Hackaday
- Serious Security: What 2000 years of cryptography can teach us – Naked Security
- Serverless computing: one step forward, two steps back | the morning paper
- The AI cybersecurity impact for IoT - Microsoft Secure
- Nine 2019 Cybersecurity PredictionsSecurity Affairs
- 6 Reasons We Need to Boost Cybersecurity Focus in 2019Security Affairs
- 4 ways to prepare for GDPR and similar privacy regulations - TechRepublic
- Chris's Wiki :: blog/linux/ZFSLicenseTwoViews
- Chris's Wiki :: blog/linux/CPUNumbersNotContiguous
- NFS. Not… Dead… Yet… - krypted.com
- Julia Reda – Designing the future of cybersecurity in Europe
- The challenges of adopting a consistent cybersecurity framework in the insurance industry - Microsoft Secure
- Guide to Developing a National Cybersecurity Strategy—a resource for policymakers to respond to cybersecurity challenges - Microsoft Secure
- RHEL 6 server receiving error mounting CIFS (Windows) share – mount error(112): Host is down | setaOffice
- Running Home Assistant in a Docker container with a Z-Wave USB stick · major.io
- All In with Home Assistant – Scott Gruby's Blog
- 2019 Cloud Predictions - Part 3 | APMdigest - Application Performance Management
- 2019 Cloud Predictions - Part 2 | APMdigest - Application Performance Management
- 2019 Cloud Predictions - Part 1 | APMdigest - Application Performance Management
- Virtual Machines do not boot after moving from Windows Server 2012 R2 to Windows Server 2019 - American Boffin
- Security in Windows Server 2019 - Security Art Work
- Data Security is a Global Economic Imperative - Blog | Tenable®
- Sitadel - Web Application Security Scanner - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- Snyk - CLI And Build-Time Tool To Find & Fix Known Vulnerabilities In Open-Source Dependencies - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- Snyk
- Shed - .NET Runtime Inspector - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- Faraday v3.5 - Collaborative Penetration Test and Vulnerability Management Platform - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- dnSpy - .NET Debugger And Assembly Editor - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- Estimating SOC BudgetRafeeq Rehman – Personal Blog
- Robert Penz Blog » Howto install Bitwarden in a LXC container (e.g. Proxmox)
- The Evil-Twin Framework: A tool for improving WiFi security | Opensource.com
- Behind the Scenes & Under the Carpet – The CenturyLink Network that Powered AWS re:Invent 2018 | AWS News Blog
- Learn Windows PowerShell in a Month of Lunches, Third Edition #BookReview #Powershell #PowerCLI #Scripting #vExpert -
- Terence Luk: Citrix NetScaler CLI command cheat sheet
- Emotet Malware Returns to Work After Holiday Break
- Triton/Trisis Attack Was More Widespread Than ...
- 'We Want IoT Security Regulation,' Say 95% of IT ...
- The Rx for HIPAA Compliance in the Cloud
- PCI Secure Software Standard v1.0 - PCI-Secure-Software-Standard-v1_0.pdf
- PCI Secure Software Standard v1.0 - PCI-Secure-Software-Standard-v1_0.pdf
- 2018's Most Common Vulnerabilities Include Issues ...
- EU copyright laws face uncertain fate after 11 countries reject proposal
- Oracle 19c Released : How does that make you feel? | The ORACLE-BASE Blog
- GDPR Compliance and the Oracle E-Business Suite Revisited | Integrigy
- Winds of change? Winds of mediocrity.
- Vulnerabilities in building access system used by schools, governments | CSO Online
- Summary: The Dichotomy of Leadership | Daniel Miessler
- Kubernetes: List of ports Carnal0wnage - Attack Research Blog Carnal0wnage & Attack Research Blog
- iPhone 11 Plus Wi-Fi 6 Equals Undefined? | The Networking Nerd
- iTWire - Cyber security threats will keep getting worse in 2019: claim
- Home Automation I | Zamir's Board
- CNC milling with open source software | Opensource.com
- Kubernetes security: 4 tips to manage risks | The Enterprisers Project
- Kali Linux 2018 for testing and maintaining Windows security - Wolf Halton and Bo Weaver [Interview] | Packt Hub
- How to Setup DRBD to Replicate Storage on Two CentOS 7 Servers
- Oracle Patches 284 Vulnerabilities in January Critical Patch Update
- AdoptOpenJDK - Open source, prebuilt OpenJDK binaries
- Thank You, John C. Bogle — My Money Blog
- Collection 1 data breach covers more than 772 million email addresses
- Cloud Computing TECHREPORT - 2018 ABA Survey Results | DennisKennedy.Blog
- Introduction to Ubuntu's LXD Containers - Make Tech Easier
- Chart: Stock Market Declines Are More Common Than You Think — My Money Blog
- Ryuk ransomware banks $3.7 million in five months
- Is GDPR Compliance Tougher Than HIPAA Compliance?
- Lessons From Report on Massive Singapore Healthcare Hack
- Government Shutdown: Experts Fear Deep Cybersecurity Impact
- Tom Kellermann
- Patch Tuesday, January 2019 Edition — Krebs on Security
- Ransomware Attacks: The Data Integrity Issues
- The 2019 Health Data Privacy Regulatory Outlook
- Cyber resilience and the GDPR - IT Governance Blog
- ITIL 4: What you need to know about the 2019 ITIL update - IT Governance Blog
- 2018 in Cybersecurity Review: What Happened and What the Future Brings (Part 2) 2018 in Cybersecurity Review: What Happened and What the Future Brings (Part 2)
- SMB Penetration Testing (Port 445)
- Windows Applocker Policy - A Beginner’s Guide
- How To Change E1000 into VMXNET3 without changing a MAC address | ESX Virtualization
- From Encrypting the Web to Encrypting the Net: A Technical Deep Dive on Using Certbot to Secure your Mailserver | Electronic Frontier Foundation
- OpenMediaVault – Good Times With mdadm | PenguinPunk.net
- January 2019 patchday issues | Born's Tech and Windows World
- Humana Breaches Reflect Chronic Credential Theft in ...
- Who Takes Responsibility for Cyberattacks in the Cloud?
- What’s wrong with patch-based Vulnerability Management checks? | Alexander V. Leonov
- Blowing the Dust off of an IBM AS/400 Server | Hackaday
- Resolving Microsoft SQL Server Error 4064 with PowerShell – Mike F Robbins
- The Biggest Storage Trends of 2019 | Architecting IT
- What Makes IoT A Security Risk? | The Networking Nerd
- Configuring TACACS+ Server on Ubuntu 14.04LTS – Keeran's Blog
- CLOS Topology
- Firewall Ruleset Automation with CI Pipeline « ipSpace.net blog
- How to configure Windows 10 in Kiosk Single App, full-screen mode
- Just one more esxi-guy: The D.C.L.I. (Datacenter CLI)
- Stanford uploads 111 lectures by Donald Knuth. – Virtually Fun
- Taking a look at AutoDeploy in vSphere 6.5
- Tiger - The Unix Security Audit and Intrusion Detection Tool
- Tiger - The UNIX Security audit and intrusion detection tool
- How to Set Up a Local DNS Resolver on Ubuntu 18.04, 16.04 with BIND9 - LinuxBabe
- Am I financially independent? (And does it matter?)
- CVE Vulnerabilities: All You Ever Wanted to Know About
- Top Ways to Get ROI From Your AppSec Program - Security Boulevard
- Kubernetes: Master Post Carnal0wnage - Attack Research Blog Carnal0wnage & Attack Research Blog
- Top 5 things SMBs should consider when evaluating a cybersecurity strategy | Webroot
- All About the Hotspot Honeypots - Security Boulevard
- How to data breaches happen - Security Boulevard
- Sometimes A Vulnerability Isn’t So Vulnerable
- pfSense VLANs on Proxmox - Linux Included
- SSHGuard settings on pfSense - Linux Included
- Healthcare Continues to Be Prime Target for Cyber Attacks
- SlackPirate - The Slack Enumeration and Extraction Tool - emtunc's Blog
- Using Ansible to bring up a three node Patroni cluster in minutes - Blog dbi services
- GitHub - danluu/post-mortems: A collection of postmortems. Sorry for the delay in merging PRs!
- Reading postmortems
- Verizon FiOS – ICMP Traceroute Issues
- Too much disk IO on sda in RAID10 setup | blog.windfluechter.net
- How to be More Productive by Using the “Eisenhower Box”
- GDPR Myth #1: Fine of 4% of global turnover for your first GDPR offence | VinciWorks Blog
- Senators Demand Voting Machine Vendor Explain Why It Dismisses Researchers Prodding Its Devices
- Displaying IP Info on Console with Netplan – Fixing IT
- Julia Reda – In January, the EU starts running Bug Bounties on Free and Open Source Software
- TheHive Project – Open Source, Free and Scalable Cyber Threat Intelligence & Security Incident Response Solutions
- Tesla Model 3 known good accessories | TinkerTry IT @ Home
- PRETty - "PRinter Exploitation Toolkit" LAN Automation Tool - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- Tesla Model 3 replacing my 13 year old Honda Civic Hybrid, let's see how that goes. So far, so good! | TinkerTry IT @ Home
- 7 Habits of a Highly Effective CISO: 2019 Data Security Resolutions - Data Security Blog | Thales eSecurity
- Docker Security Tips & Best Practices – Threat Stack
- Healthcare IT Continues to Struggle with Backup Strategies - Security Boulevard
- 9 Benefits of ISO 27001 Certification (Some You Know, Some You Probably Don’t) | Pivot Point Security
- Cloud Hosting Provider DataResolution.net Battling Christmas Eve Ransomware Attack — Krebs on Security
- MISP - Malware Information Sharing Platform and Threat Sharing - The Open Source Threat Intelligence Platform
- The Docker Bench For Security - A Script That Checks For Dozens Of Common Best-Practices Around Deploying Docker Containers In Production - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- XSRFProbe - The Prime Cross Site Request Forgery Audit And Exploitation Toolkit - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- The 4 stages of cyber resilience - IT Governance Blog
- The End (of 2018) Is Near: Looking Back for Optimism
- New Year’s Resolution for 2019: Cybersecurity Must Be the Top Priority for the Board
- New cybersecurity rules take effect in South Carolina
- Health Industry Cybersecurity Practices: Managing Threats and Protecting Patients - HICP-Main-508.pdf
- Analyzing the Portuguese DPA's first GDPR fine
- Marriott Provides Update on Starwood Database Security Incident
- 25 Years Later: Looking Back at the First Great ...
- 2018 Health Data Breach Tally: An Analysis - HealthcareInfoSecurity
- Do not look for Cheap Black Friday Deal Testing - EvilTester.com
- The Difference Between Security and Privacy | Daniel Miessler
- Major US newspapers crippled by Ryuk ransomware attack | CSO Online
- Japan seeks cyberattacks to be in scope of security treaty with U.S. - Japan Today
- Why Automation Matters : Consistent Test Environments | The ORACLE-BASE Blog
- Easy PXE boot testing with only HTTP using iPXE and libvirt
- 10 ways to use OneNote for Project Management - SharePoint Maven
- Extend the evaluation period of Windows Server 2012/2016 and 2019 - ivobeerens.nl
- Recognizing Vendor Risks to National Security in the CFIUS Process - Lawfare
- How the Boston Children’s Hospital Is Innovating on Top of an Open Cloud
- 7 Nginx Rewrite Rule Examples with Reg-Ex and Flags
- The Developer Coefficient
- Yammer Seen Counts for Conversations – All About I.T.
- The two most important ways to defend against security threats | CSO Online
- Introduction to Cryptography Basic Principles
- weblogic - how to change listen port from default 7001 to something different? - Stack Overflow
- How to change the default port of weblogic (7001) (BEA/Weblogic forum at Coderanch)
- 10 Google Docs Tips That Take Seconds and Save You Time
- Launching Rational Cybersecurity for the Business | Security Architects Partners Dan Blum
- Erman Arslan's Oracle Blog: RDBMS -- TLS 1.2 support and issues ORA-29263: HTTP protocol error & ORA-29024: Certificate validation failure
- Erman Arslan's Oracle Blog: Oracle Seminar -- Oracle Technologies and Oracle Products + Oracle Job roles
- Erman Arslan's Oracle Blog: Exadata -- Exadata X3 reimaging problem -- biosbootorder
- Erman Arslan's Oracle Blog: Weblogic -- Performance problem - Forms & Reports environment -- Unable to load performance pack / libmuxer.so
- Change the Listen Port for Weblogic AdminServer #Oracle #IDM #Identity - TUMY | TECH
- Erman Arslan's Oracle Blog: Weblogic -- HACMP Configuration, IP Address Change
- The Finnish Hyperion Guy: Tidy Up WebLogic Server After EPM System Installation
- Vulnerability Management Part 1 I Pivot Point Security
- Yes: Your Law Firm Needs to Do a Business Impact Analysis | Pivot Point Security
- WebLogic AdminServer Port Conflict Remote Running on PC
- Java mon amour: Installing JIRA
- Java mon amour: Jboss CLI, change individual attributes of a security domain without having to remove and add the domain from scratch
- Java mon amour: java showSettings
- Default Port Numbers You Need to Know as an Administrator
- Why Tenable/NESSUS requires full level 15 access for Cisco devices? Don’t need it.
- Security/TLS Configurations - MozillaWiki
- Security/Server Side TLS - MozillaWiki
- Transport Layer Protection Cheat Sheet - OWASP
- Oracle – Got minus one from a read call – How to tackle? | {"code":"java"}
- Come Across: Presenting : Explore and Implement SharePoint Security: Permissions, Identities, and Objects @ NCS SharePoint CoP Group
- Security Update Guide
- CyGraph: Cybersecurity Situational Awareness That’s More Scalable, Flexible & Comprehensive - Neo4j Graph Database Platform
- TDS Endpoints: SQL Server's "Listener" | ColleenMorrow.com
- Private Investigator - Stillinger investigations
- How a U.S. Health Care System Uses 15-Minute Huddles to Keep 23 Hospitals Aligned
- Automotive Cybersecurity
- CDRH’s Medical Device Safety Action Plan – An Aspirational Blueprint for Addressing Medical Device Safety | Health Law | STAT
- Thora A. Johnson
- Active Directory® 101 - JumpCloud
- How to check if your processor supports Virtualization Technology on Ubuntu
- Chris's Wiki :: blog/linux/ZFSFileserverSameness
- Malwarebytes IT Security Predictions 2019 | Born's Tech and Windows World
- Serverless OpenLDAP™ - Security Boulevard
- The Best of Shape Security 2018 - Security Boulevard
- OPTPOLINES - Formerly Relpolines, Lower Overhead To Retpolines For Spectre Mitigation - Phoronix
- Local stratum-1 NTP server
- Ubiquiti Unifi setup
- Touchless health monitoring module works with Raspberry Pi
- Home - ROI-NJ
- MacOS Security Baseline Script – JerryGamblin.com
- Favorite Security Books Of 2018 – JerryGamblin.com
- Welcome to ServerlessSecurity.org! | ServerlessSecurity.org
- Host Websites On Github – JerryGamblin.com
- SQL Server 2014 Service Pack 3 is now Available!!! | SQL Server Release Services
- Adam Shostack's personal homepage
- The Hard Truth About G2A, Kinguin and Grey Market Keys – Locke's Journey
- Understanding the unique Israeli concept of Rosh Gadol (ראש גדול)-updated | Allon Shevat
- News – Joel on Software
- GitHub - cybermaggedon/cyberprobe: Capturing, analysing and responding to cyber attacks
- What Are Cipher Suites? - Security Boulevard
- Jacek Kowalczyk / my-debian · GitLab
- Looking Back at the Top Cyber-Securities Issues of 2018
- Cyber and Technology Resilience: Themes from cross-sector survey 2017 - 2018 - technology-cyber-resilience-questionnaire-cross-sector-report.pdf
- The Life of Kenneth: FCIX - State of the Exchange
- On Thinking About Infrastructure as Code - Scott's Weblog - The weblog of an IT pro focusing on cloud computing, Kubernetes, Linux, containers, and networking
- Hilbert’s list | Seth's Blog
- 1. High efficiency, sustainable method for growing sufficient food, including market-shifting replacements for animals as food
2. High efficiency, renewable energy sources and useful batteries (cost, weight, efficiency)
3. Effective approaches to human trafficking
4. Carbon sequestration at scale
5. Breakthrough form for democracy in a digital age
6. Scalable, profitable, sustainable methods for small-scale creators of intellectual property
7. Replacement for the University
8. Useful methods for enhancing, scaling or replacing primary education, particularly literacy
9. Beneficial man/machine interface (post Xerox Parc)
10. Cost efficient housing at scale
11. Useful response to urban congestion
12. Gene therapies for obesity, cancer and chronic degenerative diseases
13. Dramatic leaps of AI interactions with humans
14. Alternatives to paid labor for most humans
15. Successful interactions with intelligent species off Earth
16. Self-cloning of organs for replacement
17. Cultural and nation-state conflict resolution and de-escalation
18. Dramatically new artistic methods for expression
19. Useful enhancements to intellect and mind for individuals
20. Shift in approach to end-of-life suffering and solutions for pain
21. Enhanced peer-to-peer communication technologies approaching the feeling of telepathy
22. Transmutation of matter to different elements and structures
23. Off-planet outposts
It’s going to get interesting. Especially if we can imagine it.
- Cybersecurity and Insurance | Hackaday
- Patch Lady – vendors start to shut the doors on Windows 7 @ AskWoody
- Find Windows 10 Upgrade Blockers with PowerShell – smsagent
- FYI: End of Support for Windows 7, SQL-Server 2008 and more | Born's Tech and Windows World
- Effective Mental Models for Code and Systems – Cindy Sridharan – Medium
- The Art of Vacuum Tube Fabrication | Hackaday
- configuring_ssl_for_oracle_client_with_cac_using_mcs_3.pdf
- GitHub - pmdba/plsql-pii-scanner: An example of a method for scanning the Oracle data dictionary for potential PII data and automating specific responses, such as encrypting of columns or alerting the DBA, when new data is found.
- Finding And Fixing Node.js Memory Leaks: A Practical Guide | eknori.de
- Firejail - Securely Run Untrusted Applications in Linux
- I Hunt Sys Admins - The Intercept
- How China’s Elite APT10 Hackers Stole the World’s Secrets | WIRED
- How To Organize Your Income And Expenses
- How VMware Certifications changed my life -
- Getting started with chaos engineering | Opensource.com
- Chris's Wiki :: blog/linux/ZFSFileserverSetupIII
- Creating a useful spec | Seth's Blog
- NASA Astronomer Nancy Grace Roman, 'Mother' Of Hubble Space Telescope, Is Dead : NPR
- PostgreSQL-Diagnostic-Queries – DB-Tune
- Hackers Attack IPMI Default Passwords to Deploy Ransomware On Linux Servers - Latest Hacking News
- EU offers bounties to help find security flaws in open source tools
- Malware stalls delivery of LA Times and other major US newspapers
- Linux ip Command Examples - nixCraft
- Azure in the Government of Canada - Eric’s Azure Blog
- Penetration Testing on Group Policy Preferences
- From Encrypting the Web to Encrypting the Net: 2018 Year in Review | Electronic Frontier Foundation
- Side-Channel Vulnerability Variants 3a and 4 - Spectre and Meltdown - blackMORE Ops
- Building a PowerShell Process Memory Tool • The Lonely Administrator
- How to add network driver to Windows 10 PE | Marco Franssen
- Put your ssh experience in Windows on Steroids | Marco Franssen
- DSHR's Blog: Securing The Hardware Supply Chain
- Top 5 Cybersecurity Priorities for 2019: Ponemon Study - Blog | Tenable®
- Healthcare Data Breaches Associated with 64% Increase in Advertising Expenditures - Security Boulevard
- Top 30 Chief Information Security Officer (CISO) Interview Questions and Answers for 2018
- Top 30 Chief Information Security Officer (CISO) Interview Questions and Answers for 2018 - Security Boulevard
- Healthcare Cybersecurity in 2019: The Time is Now - Security Boulevard
- Top 20 Most Popular Hacking Tools in 2018 - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- Improving DNS logging, dnstap on Ubuntu - Koen Van Impe - vanimpe.eu
- Data Sanitization 5.3 release | OPSWAT
- The Year of the GDPR: 2018’s Most Famous Privacy Regulation in Review | Electronic Frontier Foundation
- Blog Exploits on the Rise | Onapsis
- Selenium IDE Tactical or Strategic? - Evil Tester - Technical Testing with Skill, Attitude and Pragmatism
- Looking Back: 2018 Project Report Card - Scott's Weblog - The weblog of an IT pro focusing on cloud computing, Kubernetes, Linux, containers, and networking
- An Internet Outage Could Kick In WannaCry Ransomware Again
- The elements of cybersecurity hygiene and secure networks -- Part 2
- The elements of cybersecurity hygiene and secure networks -- Part 1
- Cuckoo – Sandboxed Malware Analysis – ls /blog
- Chris's Wiki :: blog/sysadmin/MetricsAndUnderstandingMore
- The Best Maker YouTube Channels | Cool Tools
- Intel 5500 chipset heatsink tuning
- Smokeping – network latency monitor with Raspberry Pi – Alexander's Blog
- Context: Your Super-Weapon in Vulnerability Management? - Security Boulevard
- Industrial Control Systems Healthcheck | Mandiant | FireEye
- PCI Pal and Verizon White Paper Examines PCI Security Compliance in Contact Centre Environments - Security Boulevard
- Apache Struts Vulnerabilities vs Spring Vulnerabilities — One of these popular open source projects might be riskier than the other - Security Boulevard
- Defense in Depth: 4 Essential Layers of ICS Security
- AWS Lambda Security Quick-Start Guide
- Secure & Compliant Payment Solutions for Contact Centres | PCI Pal
- OWASP Top 10 Security Risks – Part II - Security Boulevard
- Software Monitoring for NERC CIP Compliance: Part 1
- Continuous Monitoring : Academic Paper - Security Boulevard
- OWASP Top 10 Vulnerabilities List — You’re Probably Using It Wrong
- A Brief Introduction to the OpenVAS Vulnerability Scanner
- Tis the Season to Check your SSL/TLS Cipher List Thrice (RCurl/curl/openssl) - Security Boulevard
- Cybersecurity is Increasingly Important for M&A Dealmakers - Security Boulevard
- PIPEDA & MDR: Breaches, Reporting and Advice
- Shared responsibility model: Who owns cloud security? - Security Boulevard
- RACI matrix in ISO 27001 implementation – How to use it?
- Negative Impact of Incorrect CSP Implementations - Security Boulevard
- Future Crimes by Marc Goodman (Book Summary) - Security Boulevard
- 37% of Ransomware Attacks Targeted Healthcare Organizations in Q3, Cyber Insurer Says - Security Boulevard
- PIPEDA Best Practices Achieved with MDR - Part 2 - Security Boulevard
- PIPEDA Best Practices Achieved with MDR - Security Boulevard
- Achieve CIS Compliance in Cloud, Container and DevOps Environments
- FreeRADIUS for MSPs - Security Boulevard
- Ten Ways Your Healthcare Org May Be Violating HIPAA - Security Boulevard
- 36 Best Business Books that Changed Microsoft Leaders’ Lives – J.D. Meier's Blog
- How I Became A Believer In Consuming IT Security As A Service - Security Boulevard
- 5 lessons public wi-fi can teach us about cybersecurity - Security Boulevard
- Apache Struts Vulnerabilities Burden Us With a ‘Stay or Go’ Deliberation - Security Boulevard
- A Little Guide to SMB Enumeration
- NHS is still assessing the cost of WannaCry one year laterSecurity Affairs
- CompTIA A+ Renewal Process - Security Boulevard
- Security Vulnerability in Internet-Connected Construction Cranes - Schneier on Security
- How to Enable HTTP/2 in Nginx
- Spectre mitigation guts Linux 4.20 performance – Naked Security
- InfoSec Handlers Diary Blog - Restricting PowerShell Capabilities with NetSh
- Pedagogic-cybersecurity-framework.pdf
- 6 years of Raspberry Pi in video | Opensource.com
- stoQ - An Open Source Framework For Enterprise Level Automated Analysis - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- Keyfinder - A Tool For Finding And Analyzing Private (And Public) Key Files, Including Support For Android APK Files - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- 6 Ways to Anger Attackers on Your Network
- Reddit helps admin solve mystery of rogue Raspberry Pi – Naked Security
- Why a Helium Leak Disabled Every iPhone in a Medical Facility - Motherboard
- ꓘamerka — Build interactive map of cameras from Shodan
- Here's How Easy It Is to Make Your Own IMSI-Catcher
- Libvirt Fencing on a Physical KVM Host | Lisenet.com :: Linux | Security | Networking
- Yubico Security Key Review (The complete edition)
- SQLiScanner - Automatic SQL Injection With Charles And Sqlmap API - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- Understanding the 7 different types of data breaches - Security Boulevard
- Voice of the Customer: The Walsh Group found that Azure Active Directory gives them a competitive edge - Security Boulevard
- Star WannaCry victim NHS to ban fax machines by 2020 - Security Boulevard
- New NIST TLS Management Guidelines for InfoSec [Expert Advice] - Security Boulevard
- New NIST TLS Management Guidelines for InfoSec [Expert Advice] - Security Boulevard
- Notes on Build Hardening - Security Boulevard
- 5 Key Components Every Company Should Have in Their Privacy Policy - Security Boulevard
- The Top 5 Third-Party Cyber Gaps of 2018 - Security Boulevard
- Ahead of the Curve: University Incident Response Plans and Communications - Security Boulevard
- OWASP 'ServerlessGoat': A Vulnerable Demo Serverless Application - Security Boulevard
- The Year Ahead: Cybersecurity Trends To Look Out for In 2019 - Security Boulevard
- What’s the Problem with SMB 1, and Should You Worry About SMB 2 and 3? - Security Boulevard
- Why TLS 1.3 is a Huge Improvement - Security Boulevard
- Strategic Ways to Add Value to Your IT Consulting Business
- Beyond Scanning: Don’t Let AppSec Ignorance Become Negligence - Security Boulevard
- GUEST ESSAY: Top cybersecurity developments that can be expected to fully play out in 2019 - Security Boulevard
- Want Your R&D Team to Rock? 7 Tips to Help Your Developers Perform Like a Supergroup - Security Boulevard
- Top 30 Supervisory Control and Data Acquisition (SCADA) Technician Interview Questions and Answers for 2019 - Security Boulevard
- 3 Reasons Osquery Should Be On Every Incident Responders Christmas List - Security Boulevard
- Healthcare Cybersecurity in Intensive Care - Security Boulevard
- Flaws and Vulnerabilities and Exploits – Oh My! - Security Boulevard
- 5 tips to secure your supply chain from cyberattacks - TechRepublic
- We Asked 105 Experts What Worries Them Most About the Future - Motherboard
- testssl.sh - Testing TLS/SSL Encryption Anywhere On Any Port - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- XSStrike v3.0 - Most Advanced XSS Detection Suite - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- Lynis 2.7.0 - Security Auditing Tool for Unix/Linux Systems - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- CAINE 10.0 - GNU/Linux Live Distribution For Digital Forensics Project, Windows Side Forensics And Incident Response - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- SpiderFoot - The Most Complete OSINT Collection And Reconnaissance Tool - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- DevAudit - Open-source, Cross-Platform, Multi-Purpose Security Auditing Tool - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- CRS - OWASP ModSecurity Core Rule Set - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- Jackhammer - One Security Vulnerability Assessment/Management Tool To Solve All The Security Team Problems - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- Celerystalk - An Asynchronous Enumeration and Vulnerability Scanner - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- Faraday v3.4 - Collaborative Penetration Test and Vulnerability Management Platform - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- The 4 phases of a business continuity plan - IT Governance Blog
- List of data breaches and cyber attacks in November 2018 - 251,286,753 records leaked - IT Governance Blog
- How to create a business continuity plan – with free template - IT Governance Blog
- How to build a cyber incident response team - IT Governance Blog
- 7 of the most common cyber attacks you need to prepare for - IT Governance Blog
- Your checklist for responding to and reporting data breaches - IT Governance Blog
- 10 things you must do to become cyber secure - IT Governance Blog
- Your DPO questions answered in an interview with information security experts - IT Governance Blog
- Phishing, Ransomware Attacks Continue to Menace Healthcare
- Why NIST is so popular in Japan
- 7 CI/CD tools for sysadmins | Opensource.com
- Australia's new 'decryption' law and its effect on tech companies worldwide
- HOWTO: Calculate Elapsed Business Hours Using PowerShell – Please Work
- Network UPS Tools | Calvin Bui
- VMware vSphere Security - Getting Started Hands-on Lab
- People First – The Frequently Overlooked Importance of Culture Change in DevOps Journeys – Premier Developer
- Colorado Embraces New IT Security Philosophy
- Zero Trust part 1: Identity and access management - Microsoft Secure
- StarWind rPerf free tool • Nolabnoparty
- HTTP vs HTTPS – lakkireddymadhu
- How protected are you against cyber-attacks? – lakkireddymadhu
- All major browsers drop TLS 1.0 and 1.1 in 2020 – lakkireddymadhu
- How To Set Up Nginx with HTTP/2 Support on Ubuntu 16.04 | DigitalOcean
- HTTP/2 – lakkireddymadhu
- World Computer Security Day – lakkireddymadhu
- How to Find Hidden & Saved Passwords in Windows 10 – lakkireddymadhu
- How to Be Invisible Online (Without Going off the Grid) – lakkireddymadhu
- Visibility vs Results | The ORACLE-BASE Blog
- 10 Cybersecurity Myths – lakkireddymadhu
- Penetration Testing Techniques: Conducting effective recon for enhanced phishing (Office 365 edition) – David Vassallo's Blog
- Find email addresses in seconds • Hunter (Email Hunter)
- HTTP/3 – lakkireddymadhu
- HHS Deputy Secretary Eric Hargan Describes Cyber Initiative
- Analysis: Did Anthem’s Security ‘Certification’ Have Value?
- Health Data Breach Tally: Analyzing the Latest Trends
- Getting Started with Desired State Configuration Resources for VMware - VMware PowerCLI Blog - VMware Blogs
- Medical Devices: The Long Road to Security - HealthcareInfoSecurity
- 5 – 15s DNS lookups on Kubernetes? – Quentin
- Marriott: Data on 500 Million Guests Stolen in 4-Year Breach — Krebs on Security
- Installing metasploitable with vagrant
- What the Marriott Breach Says About Security — Krebs on Security
- HHS Seeks Feedback on Potential HIPAA Changes
- Incident Response: Why a Tabletop Exercise Is Essential
- SlithIR · trailofbits/slither Wiki · GitHub
- Slither – a Solidity static analysis framework | Trail of Bits Blog
- Cybersecurity Trends to Watch Out for in 2019 | Webroot
- Windows Incident Response: Veteran Skillz
- GDPR Compliance: The Role of Vendor Risk Management
- Does HIPAA Need to Be ‘Modernized’? - HealthcareInfoSecurity
- What is a VMware VIB file?
- How to Patch vCenter Server Appliance (VCSA) - [Guide] | ESX Virtualization
- I just setup WireGuard, and I’ll never go back to OpenVPN | Logan Marchione
- Windows Incident Response: Basic Skillz, pt II
- Windows Incident Response: Basic Skillz
- Though 2018 Will Likely Not Surpass 2017 Numbers – Still Significant Year For Breach Activity
- On Pace To Break 20k Mark For Disclosed Vulnerabilities
- Visualise Sysmon Logs and Detect Suspicious Device Behaviour -SysmonSearch- - JPCERT/CC Eyes | JPCERT Coordination Center official Blog
- Visualise Event Logs to Identify Compromised Accounts - LogonTracer - - JPCERT/CC Eyes | JPCERT Coordination Center official Blog
- What Is the OBD-II Port and What Is It Used For?
- 5 Cybersecurity Predictions for 2019
- Cyber Security Lessons from Abroad – Australia’s Essential Eight
- Addressing the CISO’s Key Challenges in 2018 and Beyond with Endpoint Detection and Response
- Multiple Ways To Exploiting HTTP Authentication
- ODA : Free up space on local filesystems - Blog dbi services
- 2018 in cybersecurity: Regrets, we have a few
- How To Install OpenLDAP Server for Centralized Authentication
- Listen to the radio at the Linux terminal | Opensource.com
- Web Proxy Penetration Lab Setup Testing using Squid
- Hack the Box: Jerry Walkthrough
- Comprehensive Guide on Dirbuster Tool
- HTTP Banner Grabbing Beyond The Root - DigiNinja
- Nessus Through SOCKS Through Meterpreter - DigiNinja
- Blog, Integrating GNS3 and VirtualBox - DigiNinja
- Wifi Honey - DigiNinja
- Multiple Ways to Exploit Tomcat Manager
- Thanos: long-term storage for your Prometheus Metrics on OpenShift – Red Hat OpenShift Blog
- FAIRCON Showcases Quantitative Risk Analysis on the Cusp of Adoption | Security Architects Partners
- How to Establish a Security Culture | Security Architects Partners
- Securezoo Articles
- Routes-apply.sh - Safely apply routes and revert on error | Sebastian Neef - 0day.work
- Is It Time to Start a PSIRT? Why Your CSIRT May Not Be Enough
- Here are the most common cyber security threats that occur in the healthcare sector
- 2018 in Cybersecurity Review: What Happened and What the Future Brings (Part 1)
- 7 Ways an Old Tool Still Teaches New Lessons About ...
- 9 Traits of A Strong Infosec Resume
- 7 Free (or Cheap) Ways to Increase Your ...
- 6 Python and containers videos worth watching | Opensource.com
- Patching the vCenter Server Appliance (VCSA) using the REST API
- Dream of augmented humans endures, despite skeptics - Japan Today
- How To Install IIS In Windows Server 2019 - RootUsers
- How To Enable Remote Desktop In Windows Server 2019 - RootUsers
- U.S. GAO - Information Security: Significant Progress Made, but CDC Needs to Take Further Action to Resolve Control Deficiencies and Improve Its Program
- DSHR's Blog: Securing The Software Supply Chain
- U.S. GAO - Federal Building Security: Actions Needed to Help Achieve Vision for Secure, Interoperable Physical Access Control
- U.S. GAO - Information Security: Agencies Need to Improve Implementation of Federal Approach to Securing Systems and Protecting against Intrusions
- SQL Server Linux: fsync and Buffered I/O – SQL Server According to Bob
- SQL Server On Linux: Forced Unit Access (Fua) Internals – SQL Server According to Bob
- How to become an AWS expert | AWS News Blog
- Serverless and startups, the beginning of a beautiful friendship | AWS News Blog
- ESXi 6.5.0 fails to boot with Error loading /a.b00 – Virtually Sober
- How to Enable TLS 1.3 in Nginx
- Security operations activities to watch in 2019 | CSO Online
- The Difference Between a Penetration Test and a Red Team Engagement | Daniel Miessler
- Automating a DevOps-Friendly Security Policy
- A Container Hacker’s Guide to Living Off of the Land – Professionally Evil Insights
- Measuring container security [LWN.net]
- Security Considerations for Container Runtimes - RHD Blog
- Deploying SQL Server on K8s with Helm charts
- Virtual Patching or Good Security Design instead?
- A checklist for overcoming life and career setbacks - 80,000 Hours
- A year's worth of education for under a dollar and other 'best buys' in development, from the UK aid agency's Chief Economist - 80,000 Hours
- Response: A Chief Security Concern for Executive Teams - EtherealMind
- Zen of Routing Protocols « ipSpace.net blog
- Red Hat Global Customer Tech Outlook 2019: Automation, cloud, & security lead funding priorities
- A Chief Security Concern for Executive Teams — Krebs on Security
- 5 Dedicated Server Security Vulnerabilities and How to Troubleshoot Them – ThisHosting.Rocks
- HardenedBSD 12 Released With Jailed Bhyve, Disables SMT By Default - Phoronix
- Closing the Global Cyber Enforcement Gap - Lawfare
- NASA discloses October security breach
- The US ballistic missile system is a cybersecurity nightmare
- Errata Security: Masscan as a lesson in TCP/IP